Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cRC31pEDkr.exe

Overview

General Information

Sample Name:cRC31pEDkr.exe
Analysis ID:800441
MD5:ac2609d2181f756550e3c180329b121c
SHA1:2ac2462013be76e3bb606c7deaec5e0e4609cd59
SHA256:9730aee1d4d04bb12e1df2a5550741eed7266625f8d99443dd0cd0dffca07112
Tags:exeNanoCore
Infos:

Detection

Nanocore, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected zgRAT
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cRC31pEDkr.exe (PID: 4064 cmdline: C:\Users\user\Desktop\cRC31pEDkr.exe MD5: AC2609D2181F756550E3C180329B121C)
    • powershell.exe (PID: 3492 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 4332 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 4724 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cRC31pEDkr.exe (PID: 4980 cmdline: C:\Users\user\Desktop\cRC31pEDkr.exe MD5: AC2609D2181F756550E3C180329B121C)
    • cRC31pEDkr.exe (PID: 4556 cmdline: C:\Users\user\Desktop\cRC31pEDkr.exe MD5: AC2609D2181F756550E3C180329B121C)
    • cRC31pEDkr.exe (PID: 1876 cmdline: C:\Users\user\Desktop\cRC31pEDkr.exe MD5: AC2609D2181F756550E3C180329B121C)
  • KgZEfacljaFey.exe (PID: 6040 cmdline: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe MD5: AC2609D2181F756550E3C180329B121C)
    • schtasks.exe (PID: 5600 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • KgZEfacljaFey.exe (PID: 5196 cmdline: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe MD5: AC2609D2181F756550E3C180329B121C)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "e971e6b5-1c8b-4bb4-a1a3-7f94e076", "Group": "Ebube", "Domain1": "elzy.ddns.net", "Domain2": "127.0.0.1", "Port": 2000, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x42f0d:$a: NanoCore
    • 0x42f66:$a: NanoCore
    • 0x42fa3:$a: NanoCore
    • 0x4301c:$a: NanoCore
    • 0x566c7:$a: NanoCore
    • 0x566dc:$a: NanoCore
    • 0x56711:$a: NanoCore
    • 0x6f183:$a: NanoCore
    • 0x6f198:$a: NanoCore
    • 0x6f1cd:$a: NanoCore
    • 0x42f6f:$b: ClientPlugin
    • 0x42fac:$b: ClientPlugin
    • 0x438aa:$b: ClientPlugin
    • 0x438b7:$b: ClientPlugin
    • 0x56483:$b: ClientPlugin
    • 0x5649e:$b: ClientPlugin
    • 0x564ce:$b: ClientPlugin
    • 0x566e5:$b: ClientPlugin
    • 0x5671a:$b: ClientPlugin
    • 0x6ef3f:$b: ClientPlugin
    • 0x6ef5a:$b: ClientPlugin
    0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x42fa3:$a1: NanoCore.ClientPluginHost
    • 0x56711:$a1: NanoCore.ClientPluginHost
    • 0x6f1cd:$a1: NanoCore.ClientPluginHost
    • 0x42f66:$a2: NanoCore.ClientPlugin
    • 0x566dc:$a2: NanoCore.ClientPlugin
    • 0x6f198:$a2: NanoCore.ClientPlugin
    • 0x4333a:$b1: get_BuilderSettings
    • 0x5b657:$b1: get_BuilderSettings
    • 0x74113:$b1: get_BuilderSettings
    • 0x42ff1:$b4: IClientAppHost
    • 0x433ab:$b6: AddHostEntry
    • 0x4341a:$b7: LogClientException
    • 0x5b5c6:$b7: LogClientException
    • 0x74082:$b7: LogClientException
    • 0x4338f:$b8: PipeExists
    • 0x42fde:$b9: IClientLoggingHost
    • 0x5672b:$b9: IClientLoggingHost
    • 0x6f1e7:$b9: IClientLoggingHost
    0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0x36139:$a1: NanoCore.ClientPluginHost
      • 0x360fc:$a2: NanoCore.ClientPlugin
      • 0x364d0:$b1: get_BuilderSettings
      • 0x36187:$b4: IClientAppHost
      • 0x36541:$b6: AddHostEntry
      • 0x365b0:$b7: LogClientException
      • 0x36525:$b8: PipeExists
      • 0x36174:$b9: IClientLoggingHost
      Click to see the 38 entries
      SourceRuleDescriptionAuthorStrings
      10.2.cRC31pEDkr.exe.5290000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      10.2.cRC31pEDkr.exe.5290000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      10.2.cRC31pEDkr.exe.5290000.3.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xe38:$x2: NanoCore.ClientPlugin
      • 0xe75:$x3: NanoCore.ClientPluginHost
      • 0xe5a:$i1: IClientApp
      • 0xe4e:$i2: IClientData
      • 0xe29:$i3: IClientNetwork
      • 0xec3:$i4: IClientAppHost
      • 0xe65:$i5: IClientDataHost
      • 0xeb0:$i6: IClientLoggingHost
      • 0xe8f:$i7: IClientNetworkHost
      • 0xea2:$i8: IClientUIHost
      • 0xed2:$i9: IClientNameObjectCollection
      • 0xef7:$i10: IClientReadOnlyNameObjectCollection
      • 0xe41:$s1: ClientPlugin
      • 0x177c:$s1: ClientPlugin
      • 0x1789:$s1: ClientPlugin
      • 0x11f9:$s6: get_ClientSettings
      • 0x1249:$s7: get_Connected
      10.2.cRC31pEDkr.exe.5290000.3.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xe75:$a1: NanoCore.ClientPluginHost
      • 0xe38:$a2: NanoCore.ClientPlugin
      • 0x120c:$b1: get_BuilderSettings
      • 0xec3:$b4: IClientAppHost
      • 0x127d:$b6: AddHostEntry
      • 0x12ec:$b7: LogClientException
      • 0x1261:$b8: PipeExists
      • 0xeb0:$b9: IClientLoggingHost
      14.2.KgZEfacljaFey.exe.3b8ff64.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      Click to see the 93 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\cRC31pEDkr.exe, ProcessId: 1876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\cRC31pEDkr.exe, ProcessId: 1876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Persistence and Installation Behavior

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\cRC31pEDkr.exe, ParentImage: C:\Users\user\Desktop\cRC31pEDkr.exe, ParentProcessId: 4064, ParentProcessName: cRC31pEDkr.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp, ProcessId: 4724, ProcessName: schtasks.exe

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\cRC31pEDkr.exe, ProcessId: 1876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\cRC31pEDkr.exe, ProcessId: 1876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: cRC31pEDkr.exeReversingLabs: Detection: 66%
      Source: cRC31pEDkr.exeVirustotal: Detection: 58%Perma Link
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeReversingLabs: Detection: 66%
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTR
      Source: cRC31pEDkr.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJoe Sandbox ML: detected
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpackAvira: Label: TR/NanoCore.fadte
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "e971e6b5-1c8b-4bb4-a1a3-7f94e076", "Group": "Ebube", "Domain1": "elzy.ddns.net", "Domain2": "127.0.0.1", "Port": 2000, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Source: cRC31pEDkr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: cRC31pEDkr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Networking

      barindex
      Source: Malware configuration extractorURLs: elzy.ddns.net
      Source: Malware configuration extractorURLs: 127.0.0.1
      Source: unknownDNS query: name: elzy.ddns.net
      Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
      Source: global trafficTCP traffic: 192.168.2.5:49701 -> 194.5.98.22:2000
      Source: cRC31pEDkr.exe, 00000000.00000003.297044710.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296998530.00000000061B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
      Source: cRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296850779.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296828770.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296726022.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
      Source: cRC31pEDkr.exe, 00000000.00000003.296893411.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296871633.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296944042.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296850779.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296915043.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296828770.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296755309.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296778637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com(
      Source: cRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296778637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.comV
      Source: cRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: cRC31pEDkr.exe, 00000000.00000003.312291594.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312434363.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.:
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
      Source: cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com.
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com/
      Source: cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
      Source: cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCO
      Source: cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comUI
      Source: cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comX
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comgU
      Source: cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comiE
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.T
      Source: cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comorm
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304421291.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304556150.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304506350.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306063064.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061BB000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061C4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305483804.00000000061C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmld.
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersL
      Source: cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersn
      Source: cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersx
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com9
      Source: cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com=
      Source: cRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
      Source: cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312989584.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355271792.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF:
      Source: cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFB
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306063064.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comI.TTF
      Source: cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalicB
      Source: cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomFB
      Source: cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomd
      Source: cRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304556150.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
      Source: cRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdfet
      Source: cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355271792.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.come.com
      Source: cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312989584.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgreta
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307034097.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307202697.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307122475.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comk:
      Source: cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comonyo
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsivdo
      Source: cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsivr
      Source: cRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtur
      Source: cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comuB
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
      Source: cRC31pEDkr.exe, 00000000.00000003.298437658.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298492392.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn%
      Source: cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298249561.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
      Source: cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/H
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/pa
      Source: cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnalg
      Source: cRC31pEDkr.exe, 00000000.00000003.298437658.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298492392.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnp
      Source: cRC31pEDkr.exe, 00000000.00000003.308327351.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308403894.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308132703.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308242645.00000000061B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: cRC31pEDkr.exe, 00000000.00000003.308132703.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/q
      Source: cRC31pEDkr.exe, 00000000.00000003.308242645.00000000061B1000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.309287347.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.309054521.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302344077.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/B
      Source: cRC31pEDkr.exe, 00000000.00000003.301234096.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/K
      Source: cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0;
      Source: cRC31pEDkr.exe, 00000000.00000003.301234096.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0MSB
      Source: cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
      Source: cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/B
      Source: cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/K
      Source: cRC31pEDkr.exe, 00000000.00000003.304174210.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304255888.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302711504.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302453010.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303976325.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303455893.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302393161.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302254936.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303356467.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304105124.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302841481.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302937899.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303747330.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302501034.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302640559.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303072404.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Y
      Source: cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/o
      Source: cRC31pEDkr.exe, 00000000.00000003.302453010.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302393161.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302254936.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302501034.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302344077.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s_tr
      Source: cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: cRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com.I
      Source: cRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comb-n
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
      Source: cRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298129567.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298291425.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298249561.00000000061B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: cRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krUN.TTFq
      Source: cRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298129567.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krs-c
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299081793.000000000187C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
      Source: cRC31pEDkr.exe, 00000000.00000003.299081793.000000000187C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com(T
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn%I
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnF
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnai
      Source: unknownDNS traffic detected: queries for: elzy.ddns.net
      Source: cRC31pEDkr.exe, 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTR

      System Summary

      barindex
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.32981e4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.32731c8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 7.2.KgZEfacljaFey.exe.2c93208.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
      Source: 7.2.KgZEfacljaFey.exe.2cb8224.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: cRC31pEDkr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.32981e4.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.32731c8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 7.2.KgZEfacljaFey.exe.2c93208.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
      Source: 7.2.KgZEfacljaFey.exe.2cb8224.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CC77C0_2_030CC77C
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CE8230_2_030CE823
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CE8300_2_030CE830
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07BF00060_2_07BF0006
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07BF00400_2_07BF0040
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07ED00400_2_07ED0040
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07ED00060_2_07ED0006
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127C77C7_2_0127C77C
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127E8227_2_0127E822
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127E8307_2_0127E830
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_052A4BE87_2_052A4BE8
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_052A4BD87_2_052A4BD8
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE48010_2_04CBE480
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE47310_2_04CBE473
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBBBD410_2_04CBBBD4
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D9F5F810_2_04D9F5F8
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D9A61010_2_04D9A610
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D9978810_2_04D99788
      Source: cRC31pEDkr.exe, 00000000.00000003.336610706.000000000879D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamempfA.exe: vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 00000000.00000000.293953891.0000000000E62000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamempfA.exe: vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 00000000.00000002.357794140.0000000007A80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTigra.dll. vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.566234207.0000000003751000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.566234207.0000000003738000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.567804764.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exeBinary or memory string: OriginalFilenamempfA.exe: vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: KgZEfacljaFey.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: cRC31pEDkr.exeReversingLabs: Detection: 66%
      Source: cRC31pEDkr.exeVirustotal: Detection: 58%
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile read: C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: cRC31pEDkr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmpJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmpJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5E04.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@22/12@10/2
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: cRC31pEDkr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2056:120:WilError_01
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{e971e6b5-1c8b-4bb4-a1a3-7f94e07616a6}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4592:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4580:120:WilError_01
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeMutant created: \Sessions\1\BaseNamedObjects\RtIYcrDD
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4476:120:WilError_01
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: cRC31pEDkr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: cRC31pEDkr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: cRC31pEDkr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

      Data Obfuscation

      barindex
      Source: cRC31pEDkr.exe, Snake/Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: KgZEfacljaFey.exe.0.dr, Snake/Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.cRC31pEDkr.exe.e60000.0.unpack, Snake/Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CD838 pushad ; iretd 0_2_030CD839
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CD83B push esp; iretd 0_2_030CD841
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07BF3602 push edi; retf 0_2_07BF3603
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127CF52 push 8402B5CBh; retf 7_2_0127CF59
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127D83A push esp; iretd 7_2_0127D841
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127D838 pushad ; iretd 7_2_0127D839
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_052A624F push eax; mov dword ptr [esp], edx7_2_052A6264
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE0F0 push edx; iretd 10_2_04CBE312
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE471 push ebx; iretd 10_2_04CBE472
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE0D8 push ecx; iretd 10_2_04CBE0E2
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE0E3 push ecx; iretd 10_2_04CBE0E6
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE0E7 push ecx; iretd 10_2_04CBE0EA
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE349 push edx; iretd 10_2_04CBE34A
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE36F push edx; iretd 10_2_04CBE372
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE373 push edx; iretd 10_2_04CBE37A
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBEDEF push edi; iretd 10_2_04CBEDF2
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBEDF3 push edi; iretd 10_2_04CBEDF6
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBEDF7 push edi; iretd 10_2_04CBEDFA
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBED89 push esi; iretd 10_2_04CBED8A
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBEDB9 push esi; iretd 10_2_04CBEDBA
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB8A61 push ss; iretd 10_2_04CB8A62
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB8A70 push ss; iretd 10_2_04CB8B82
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB96C7 push ds; iretd 10_2_04CB96CA
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB9660 push ds; iretd 10_2_04CB9662
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBF798 pushad ; iretd 10_2_04CBF79A
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB93D9 push ds; iretd 10_2_04CB93DA
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB7A80 push cs; iretd 10_2_04CB7C62
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB7A71 push cs; iretd 10_2_04CB7A72
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D90027 push 683C04CFh; iretd 10_2_04D9003A
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D969F8 pushad ; retf 10_2_04D969F9
      Source: cRC31pEDkr.exeStatic PE information: 0xF2C4F3B5 [Sun Jan 25 03:08:37 2099 UTC]
      Source: initial sampleStatic PE information: section name: .text entropy: 7.818047676595979
      Source: initial sampleStatic PE information: section name: .text entropy: 7.818047676595979
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile opened: C:\Users\user\Desktop\cRC31pEDkr.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.32981e4.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.32731c8.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.KgZEfacljaFey.exe.2c93208.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.KgZEfacljaFey.exe.2cb8224.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 6040, type: MEMORYSTR
      Source: cRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
      Source: cRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
      Source: C:\Users\user\Desktop\cRC31pEDkr.exe TID: 5236Thread sleep time: -37665s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exe TID: 3924Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3584Thread sleep time: -11068046444225724s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2848Thread sleep time: -3689348814741908s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe TID: 6064Thread sleep time: -37665s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe TID: 1728Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exe TID: 3124Thread sleep time: -13835058055282155s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe TID: 860Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9305Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9086Jump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeWindow / User API: threadDelayed 9713Jump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeWindow / User API: foregroundWindowGot 853Jump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 37665Jump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 37665Jump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 922337203685477
      Source: KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
      Source: cRC31pEDkr.exe, 0000000A.00000002.561292320.0000000000C80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
      Source: KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
      Source: KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeMemory written: C:\Users\user\Desktop\cRC31pEDkr.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeMemory written: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmpJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmpJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJump to behavior
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.0000000002958000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@ %Gp@
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000029EE000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.0000000002A5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.0000000002A5E000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000029F0000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.0000000002B2A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Users\user\Desktop\cRC31pEDkr.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Users\user\Desktop\cRC31pEDkr.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: cRC31pEDkr.exe, 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: cRC31pEDkr.exe, 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: cRC31pEDkr.exe, 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: cRC31pEDkr.exe, 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHost
      Source: KgZEfacljaFey.exe, 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: KgZEfacljaFey.exe, 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: KgZEfacljaFey.exe, 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: KgZEfacljaFey.exe, 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: KgZEfacljaFey.exe, 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      112
      Process Injection
      1
      Masquerading
      11
      Input Capture
      21
      Security Software Discovery
      Remote Services11
      Input Capture
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Scheduled Task/Job
      11
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      Exfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingData Transfer Size Limits21
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Hidden Files and Directories
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
      Obfuscated Files or Information
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
      Software Packing
      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
      Timestomp
      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 800441 Sample: cRC31pEDkr.exe Startdate: 07/02/2023 Architecture: WINDOWS Score: 100 50 Malicious sample detected (through community Yara rule) 2->50 52 Sigma detected: Scheduled temp file as task from temp location 2->52 54 Multi AV Scanner detection for submitted file 2->54 56 10 other signatures 2->56 7 cRC31pEDkr.exe 7 2->7         started        11 KgZEfacljaFey.exe 5 2->11         started        process3 file4 36 C:\Users\user\AppData\...\KgZEfacljaFey.exe, PE32 7->36 dropped 38 C:\...\KgZEfacljaFey.exe:Zone.Identifier, ASCII 7->38 dropped 40 C:\Users\user\AppData\Local\...\tmp5E04.tmp, XML 7->40 dropped 42 C:\Users\user\AppData\...\cRC31pEDkr.exe.log, ASCII 7->42 dropped 58 Uses schtasks.exe or at.exe to add and modify task schedules 7->58 60 Adds a directory exclusion to Windows Defender 7->60 62 Injects a PE file into a foreign processes 7->62 13 cRC31pEDkr.exe 6 7->13         started        18 powershell.exe 19 7->18         started        20 powershell.exe 21 7->20         started        26 3 other processes 7->26 64 Multi AV Scanner detection for dropped file 11->64 66 Machine Learning detection for dropped file 11->66 22 schtasks.exe 11->22         started        24 KgZEfacljaFey.exe 11->24         started        signatures5 process6 dnsIp7 46 elzy.ddns.net 194.5.98.22, 2000, 49701, 49702 DANILENKODE Netherlands 13->46 48 127.0.0.1 unknown unknown 13->48 44 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 13->44 dropped 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->68 28 conhost.exe 18->28         started        30 conhost.exe 20->30         started        32 conhost.exe 22->32         started        34 conhost.exe 26->34         started        file8 signatures9 process10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      cRC31pEDkr.exe67%ReversingLabsByteCode-MSIL.Trojan.RedLine
      cRC31pEDkr.exe58%VirustotalBrowse
      cRC31pEDkr.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe67%ReversingLabsByteCode-MSIL.Trojan.RedLine
      SourceDetectionScannerLabelLinkDownload
      10.2.cRC31pEDkr.exe.5a60000.5.unpack100%AviraTR/NanoCore.fadteDownload File
      14.2.KgZEfacljaFey.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      SourceDetectionScannerLabelLink
      elzy.ddns.net5%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.fontbureau.comgreta0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.fontbureau.com90%URL Reputationsafe
      http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.carterandcone.como.0%URL Reputationsafe
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.fontbureau.comcomd0%URL Reputationsafe
      http://www.carterandcone.comX0%URL Reputationsafe
      http://www.fontbureau.comk:0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/K0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/B0%URL Reputationsafe
      http://www.fontbureau.come.com0%URL Reputationsafe
      http://www.sandoll.co.krUN.TTFq0%Avira URL Cloudsafe
      http://en.w0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
      http://www.fontbureau.comals0%URL Reputationsafe
      http://www.zhongyicts.com.cnF0%URL Reputationsafe
      http://www.founder.com.cn/cn%0%URL Reputationsafe
      http://www.fontbureau.comI.TTF0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/B0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/K0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.carterandcone.com/0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.fontbureau.com=0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/pa0%Avira URL Cloudsafe
      http://www.carterandcone.comUI0%Avira URL Cloudsafe
      http://www.fontbureau.comdfet0%Avira URL Cloudsafe
      http://www.carterandcone.com0%URL Reputationsafe
      http://www.carterandcone.com.0%URL Reputationsafe
      http://www.sandoll.co.krs-c0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.founder.com.cn/cnp0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/s_tr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/Y0%URL Reputationsafe
      http://www.carterandcone.como.T0%Avira URL Cloudsafe
      http://www.fontbureau.comF0%URL Reputationsafe
      http://www.carterandcone.comTC0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/o0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.fontbureau.comd0%URL Reputationsafe
      http://www.founder.com.cn/cnalg0%Avira URL Cloudsafe
      http://www.fontbureau.comalicB0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.carterandcone.comorm0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y0;0%Avira URL Cloudsafe
      http://www.carterandcone.comiE0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/Y0MSB0%Avira URL Cloudsafe
      http://www.carterandcone.comgU0%Avira URL Cloudsafe
      http://www.tiro.com(T0%Avira URL Cloudsafe
      http://www.fontbureau.comsivdo0%Avira URL Cloudsafe
      http://www.agfamonotype.:0%Avira URL Cloudsafe
      http://fontfabrik.com(0%Avira URL Cloudsafe
      http://www.zhongyicts.com.cnai0%Avira URL Cloudsafe
      http://www.carterandcone.comTCO0%Avira URL Cloudsafe
      http://fontfabrik.comV0%Avira URL Cloudsafe
      http://www.fontbureau.comFB0%Avira URL Cloudsafe
      elzy.ddns.net0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/q0%Avira URL Cloudsafe
      http://www.fontbureau.comF:0%Avira URL Cloudsafe
      http://www.sajatypeworks.comb-n0%Avira URL Cloudsafe
      127.0.0.10%Avira URL Cloudsafe
      http://www.fontbureau.comonyo0%Avira URL Cloudsafe
      http://www.sajatypeworks.com.I0%Avira URL Cloudsafe
      http://www.fontbureau.comsivr0%Avira URL Cloudsafe
      http://www.fontbureau.comtur0%Avira URL Cloudsafe
      http://www.fontbureau.comcomFB0%Avira URL Cloudsafe
      http://www.zhongyicts.com.cn%I0%Avira URL Cloudsafe
      http://www.fontbureau.comuB0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/H0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      elzy.ddns.net
      194.5.98.22
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      elzy.ddns.nettrue
      • Avira URL Cloud: safe
      unknown
      127.0.0.1true
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.fontbureau.com/designers/frere-jones.htmld.cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061C4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305483804.00000000061C3000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://www.founder.com.cn/cn/pacRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designerscRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://www.sajatypeworks.comcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/cThecRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comk:cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307034097.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307202697.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307122475.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.carterandcone.comUIcRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.comgretacRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312989584.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.sandoll.co.krUN.TTFqcRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.galapagosdesign.com/DPleasecRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com9cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmlcRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comdfetcRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.urwpp.deDPleasecRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.zhongyicts.com.cncRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.carterandcone.como.cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com=cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.galapagosdesign.com/cRC31pEDkr.exe, 00000000.00000003.308327351.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308403894.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308132703.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308242645.00000000061B1000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.como.TcRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comcomdcRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comXcRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cnalgcRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/KcRC31pEDkr.exe, 00000000.00000003.301234096.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comalicBcRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/BcRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.come.comcRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355271792.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://en.wcRC31pEDkr.exe, 00000000.00000003.297044710.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296998530.00000000061B7000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comiEcRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/Y0;cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.carterandcone.comlcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298249561.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/frere-jones.htmlcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/Y0MSBcRC31pEDkr.exe, 00000000.00000003.301234096.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/tcRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.carterandcone.comgUcRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.com(TcRC31pEDkr.exe, 00000000.00000003.299081793.000000000187C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.fontbureau.comsivdocRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.agfamonotype.:cRC31pEDkr.exe, 00000000.00000003.312291594.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312434363.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comalscRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://fontfabrik.com(cRC31pEDkr.exe, 00000000.00000003.296893411.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296871633.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296944042.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296850779.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296915043.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296828770.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296755309.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296778637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.zhongyicts.com.cnFcRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnaicRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.founder.com.cn/cn%cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersGcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comI.TTFcRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306063064.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://fontfabrik.comVcRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296778637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/jp/BcRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/?cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersLcRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bThecRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/jp/KcRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comTCOcRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299081793.000000000187C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.com/cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comFBcRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.goodfont.co.krcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comcRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.com.cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sandoll.co.krs-ccRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298129567.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmcRC31pEDkr.exe, 00000000.00000003.308242645.00000000061B1000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.309287347.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.309054521.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comcRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296850779.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296828770.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296726022.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnpcRC31pEDkr.exe, 00000000.00000003.298437658.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298492392.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/qcRC31pEDkr.exe, 00000000.00000003.308132703.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comF:cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312989584.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355271792.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designersxcRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/s_trcRC31pEDkr.exe, 00000000.00000003.302453010.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302393161.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302254936.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302501034.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302344077.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comb-ncRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fonts.comcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krcRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298129567.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298291425.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298249561.00000000061B1000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.comcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersncRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/jp/YcRC31pEDkr.exe, 00000000.00000003.304174210.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304255888.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302711504.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302453010.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303976325.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303455893.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302393161.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302254936.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303356467.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304105124.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302841481.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302937899.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303747330.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302501034.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302640559.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303072404.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comonyocRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061AB000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comcRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304421291.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304556150.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304506350.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306063064.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comFcRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comTCcRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comsivrcRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.sajatypeworks.com.IcRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/ocRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comcomFBcRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comturcRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cn/HcRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comdcRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304556150.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cn%IcRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.fontbureau.com/designers/cabarga.htmlNcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cncRC31pEDkr.exe, 00000000.00000003.298437658.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298492392.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comuBcRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.carterandcone.comormcRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302344077.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061BB000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      194.5.98.22
                                      elzy.ddns.netNetherlands
                                      208476DANILENKODEtrue
                                      IP
                                      127.0.0.1
                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                      Analysis ID:800441
                                      Start date and time:2023-02-07 13:58:11 +01:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 9m 13s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:18
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample file name:cRC31pEDkr.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@22/12@10/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 94%
                                      • Number of executed functions: 63
                                      • Number of non-executed functions: 7
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, WmiPrvSE.exe
                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      13:59:13API Interceptor784x Sleep call for process: cRC31pEDkr.exe modified
                                      13:59:17Task SchedulerRun new task: KgZEfacljaFey path: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                      13:59:18API Interceptor55x Sleep call for process: powershell.exe modified
                                      13:59:32API Interceptor1x Sleep call for process: KgZEfacljaFey.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      194.5.98.22Request for Quotation (NEW PRICE LIST 2022).exeGet hashmaliciousBrowse
                                        QUOTATION AND SAMPLE LISTPDF.exeGet hashmaliciousBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          elzy.ddns.netRemittance.exeGet hashmaliciousBrowse
                                          • 194.147.140.31
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          DANILENKODEgNrfORqjCV.exeGet hashmaliciousBrowse
                                          • 194.5.98.24
                                          Scan Copy.exeGet hashmaliciousBrowse
                                          • 194.5.98.186
                                          IMAGE119.exeGet hashmaliciousBrowse
                                          • 194.5.98.12
                                          dlwat.exeGet hashmaliciousBrowse
                                          • 194.5.98.202
                                          FAKTURA D.exeGet hashmaliciousBrowse
                                          • 194.5.98.210
                                          Scan Copy.exeGet hashmaliciousBrowse
                                          • 194.5.98.174
                                          scan_2023748984785874774.exeGet hashmaliciousBrowse
                                          • 194.5.98.245
                                          BookingDetails77#6276.exeGet hashmaliciousBrowse
                                          • 194.5.98.120
                                          DOCUMENT839$#789.exeGet hashmaliciousBrowse
                                          • 194.5.98.120
                                          9E9C786810231BB2222BE822FBD43E21A02AF06B96C6C.exeGet hashmaliciousBrowse
                                          • 194.5.98.212
                                          Fully Executed Contract.jsGet hashmaliciousBrowse
                                          • 194.5.98.71
                                          PROFORMA INVOICE SCAN DOC.exeGet hashmaliciousBrowse
                                          • 194.5.98.53
                                          SIBAIRQ-PD-PUR-926.jsGet hashmaliciousBrowse
                                          • 194.5.98.71
                                          Payload.exe.exeGet hashmaliciousBrowse
                                          • 194.5.98.13
                                          DTQ112.jsGet hashmaliciousBrowse
                                          • 194.5.98.42
                                          Proforma Invoice 3001855006.jsGet hashmaliciousBrowse
                                          • 194.5.98.42
                                          EFT20009563_invoice.jsGet hashmaliciousBrowse
                                          • 194.5.98.253
                                          MDCT091.jsGet hashmaliciousBrowse
                                          • 194.5.98.109
                                          Inquiry for Quotation No. 20P3200023.exeGet hashmaliciousBrowse
                                          • 194.5.98.212
                                          Shipping Doc.pdf.exeGet hashmaliciousBrowse
                                          • 194.5.98.9
                                          No context
                                          No context
                                          Process:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.355304211458859
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                          Malicious:false
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):1216
                                          Entropy (8bit):5.355304211458859
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                          Malicious:true
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):21864
                                          Entropy (8bit):5.598059944466488
                                          Encrypted:false
                                          SSDEEP:384:+tCRLq0+3R2EYf3YSVxnejulrItCiJ9g9SJ3uyV1lm0ZSAVrdt8hqA+iRYg:bDgUxeClrSy9cuG3Uqg
                                          MD5:F0E335C7015467AA88CB725D1E79D3E3
                                          SHA1:2CB9B862933DC5AF60596D12EDB1F676C4AD9B6F
                                          SHA-256:C02AE364FCD84F5B4E478CB668B7F578C55E678AF9EE4C30254FB90B30BD0422
                                          SHA-512:8CE3A87486B215ABCDB564EBC8489E1D88065F7936D5234E6BCC201A1D34C4845D618CBC04F95F40700170A806881486B2E45E2F161188B9FD19831C24F8EB22
                                          Malicious:false
                                          Preview:@...e...............................:.X..............@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview:1
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview:1
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview:1
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview:1
                                          Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1604
                                          Entropy (8bit):5.134330559128222
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxvn:cgeCaYrFdOFzOzN33ODOiDdKrsuTuv
                                          MD5:B60F588C1155AF27B4F7C47D9BA68B63
                                          SHA1:060A5DB198839D2D4D33E2DA93540D3BD1851042
                                          SHA-256:4467302D8DE2891402E2EC25B9824333F433D46A306D120E32D93BE4F216C492
                                          SHA-512:89527F28ED63991D6B1C0D18FDA21F9CF77E0CAB8EEA228359B9781C57FCE2D5EDACDBE5F26C5EB39DEE9C9B0384BD9C89628991D6A5C53B4C87B426410FD537
                                          Malicious:true
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                          Process:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1604
                                          Entropy (8bit):5.134330559128222
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxvn:cgeCaYrFdOFzOzN33ODOiDdKrsuTuv
                                          MD5:B60F588C1155AF27B4F7C47D9BA68B63
                                          SHA1:060A5DB198839D2D4D33E2DA93540D3BD1851042
                                          SHA-256:4467302D8DE2891402E2EC25B9824333F433D46A306D120E32D93BE4F216C492
                                          SHA-512:89527F28ED63991D6B1C0D18FDA21F9CF77E0CAB8EEA228359B9781C57FCE2D5EDACDBE5F26C5EB39DEE9C9B0384BD9C89628991D6A5C53B4C87B426410FD537
                                          Malicious:false
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                          Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          File Type:Non-ISO extended-ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):8
                                          Entropy (8bit):3.0
                                          Encrypted:false
                                          SSDEEP:3:CS:P
                                          MD5:76420758AE4C29CAAD2AA6B116E41716
                                          SHA1:59893B920B4F94B033959DA9C02E6156E8DD98DF
                                          SHA-256:136D683384EA664828711F6043304C6D2A1E89C3F8DAD346F6007FF13DD5F45D
                                          SHA-512:892DCB7634396D212CFA50CCA7610683BC01B83743131BE2F700912617F563498EBE2F0450DD59CF46448A298DB2A37C68394DEFF8A00D5480CD68F6A509FB64
                                          Malicious:true
                                          Preview:of.V..H
                                          Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):705536
                                          Entropy (8bit):7.810105998338931
                                          Encrypted:false
                                          SSDEEP:12288:VVC66Bm2iNNHOp7HPfubIVc1E0cE3UyV5sXoDCnJ8OSTaHlUI1FuH66B:GVM1rut21E0cEkI24D6PSuHlvuHV
                                          MD5:AC2609D2181F756550E3C180329B121C
                                          SHA1:2AC2462013BE76E3BB606C7DEAEC5E0E4609CD59
                                          SHA-256:9730AEE1D4D04BB12E1DF2A5550741EED7266625F8D99443DD0CD0DFFCA07112
                                          SHA-512:EE9DC08DD3E713FFE4A7FB658A37E8C689A5CDAC7E1CFA6FB3A26A048663FF70B524C49FCEF3B0C033D4DD2EFBE290E2DC62BE74145C461D1E711356C826CDA2
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 67%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........f...w...........................................................0............}......}.....(.......(........}.......s....}..... .... ....s....}......{......s....}.....{....r...po......(.....{....o......{......o......{....o..........s....s....}.....(......(.....{....o.....*....0.............{.....X}.....{.....].....,-..{....(....o......{....o....(....o.....8......{....( ...o......{....o....( ...o.......(......{....,..{.......+....,..(.....{......s....o........{....o!..
                                          Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.810105998338931
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:cRC31pEDkr.exe
                                          File size:705536
                                          MD5:ac2609d2181f756550e3c180329b121c
                                          SHA1:2ac2462013be76e3bb606c7deaec5e0e4609cd59
                                          SHA256:9730aee1d4d04bb12e1df2a5550741eed7266625f8d99443dd0cd0dffca07112
                                          SHA512:ee9dc08dd3e713ffe4a7fb658a37e8c689a5cdac7e1cfa6fb3a26a048663ff70b524c49fcef3b0c033d4dd2efbe290e2dc62be74145c461d1e711356c826cda2
                                          SSDEEP:12288:VVC66Bm2iNNHOp7HPfubIVc1E0cE3UyV5sXoDCnJ8OSTaHlUI1FuH66B:GVM1rut21E0cEkI24D6PSuHlvuHV
                                          TLSH:39E401811D64CA58E2F90EBD0F7C5A2D8FF45C9923E3E2B40BE6B4D9A463783C815536
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................... ............@................................
                                          Icon Hash:00828e8e8686b000
                                          Entrypoint:0x4ad902
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0xF2C4F3B5 [Sun Jan 25 03:08:37 2099 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xad8b00x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x5bc.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xad8940x1c.text
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xab9080xaba00False0.8738022350691915data7.818047676595979IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xae0000x5bc0x600False0.4283854166666667data4.10376699366461IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xb00000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_VERSION0xae0900x32cdata
                                          RT_MANIFEST0xae3cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Feb 7, 2023 13:59:31.713982105 CET497012000192.168.2.5194.5.98.22
                                          Feb 7, 2023 13:59:31.757090092 CET200049701194.5.98.22192.168.2.5
                                          Feb 7, 2023 13:59:32.392255068 CET497012000192.168.2.5194.5.98.22
                                          Feb 7, 2023 13:59:32.435534000 CET200049701194.5.98.22192.168.2.5
                                          Feb 7, 2023 13:59:33.001553059 CET497012000192.168.2.5194.5.98.22
                                          Feb 7, 2023 13:59:33.044615030 CET200049701194.5.98.22192.168.2.5
                                          Feb 7, 2023 13:59:37.180790901 CET497022000192.168.2.5194.5.98.22
                                          Feb 7, 2023 13:59:37.223854065 CET200049702194.5.98.22192.168.2.5
                                          Feb 7, 2023 13:59:37.845783949 CET497022000192.168.2.5194.5.98.22
                                          Feb 7, 2023 13:59:37.888947010 CET200049702194.5.98.22192.168.2.5
                                          Feb 7, 2023 13:59:38.549042940 CET497022000192.168.2.5194.5.98.22
                                          Feb 7, 2023 13:59:38.592144012 CET200049702194.5.98.22192.168.2.5
                                          Feb 7, 2023 13:59:42.792201996 CET497032000192.168.2.5194.5.98.22
                                          Feb 7, 2023 13:59:42.835329056 CET200049703194.5.98.22192.168.2.5
                                          Feb 7, 2023 13:59:43.346213102 CET497032000192.168.2.5194.5.98.22
                                          Feb 7, 2023 13:59:43.389285088 CET200049703194.5.98.22192.168.2.5
                                          Feb 7, 2023 13:59:44.049402952 CET497032000192.168.2.5194.5.98.22
                                          Feb 7, 2023 13:59:44.092649937 CET200049703194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:04.116805077 CET497102000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:04.159924030 CET200049710194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:04.660533905 CET497102000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:04.703702927 CET200049710194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:05.207479000 CET497102000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:05.250614882 CET200049710194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:09.301789045 CET497122000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:09.344774961 CET200049712194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:09.848398924 CET497122000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:09.891593933 CET200049712194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:10.395400047 CET497122000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:10.438546896 CET200049712194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:14.486471891 CET497132000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:14.530375004 CET200049713194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:15.036335945 CET497132000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:15.081300020 CET200049713194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:15.583241940 CET497132000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:15.626451015 CET200049713194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:35.702507973 CET497182000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:35.745628119 CET200049718194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:36.256872892 CET497182000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:36.300020933 CET200049718194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:36.803818941 CET497182000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:36.846869946 CET200049718194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:41.506460905 CET497192000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:41.549746990 CET200049719194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:42.054270983 CET497192000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:42.097364902 CET200049719194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:42.663737059 CET497192000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:42.708404064 CET200049719194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:46.919289112 CET497212000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:46.962531090 CET200049721194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:47.476569891 CET497212000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:47.519581079 CET200049721194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:00:48.023495913 CET497212000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:00:48.066632986 CET200049721194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:01:07.652275085 CET497262000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:01:07.695615053 CET200049726194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:01:08.207467079 CET497262000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:01:08.250525951 CET200049726194.5.98.22192.168.2.5
                                          Feb 7, 2023 14:01:08.762331963 CET497262000192.168.2.5194.5.98.22
                                          Feb 7, 2023 14:01:08.805807114 CET200049726194.5.98.22192.168.2.5
                                          TimestampSource PortDest PortSource IPDest IP
                                          Feb 7, 2023 13:59:31.679389000 CET6189353192.168.2.58.8.8.8
                                          Feb 7, 2023 13:59:31.699139118 CET53618938.8.8.8192.168.2.5
                                          Feb 7, 2023 13:59:37.159048080 CET6064953192.168.2.58.8.8.8
                                          Feb 7, 2023 13:59:37.179442883 CET53606498.8.8.8192.168.2.5
                                          Feb 7, 2023 13:59:42.715939045 CET5144153192.168.2.58.8.8.8
                                          Feb 7, 2023 13:59:42.735929966 CET53514418.8.8.8192.168.2.5
                                          Feb 7, 2023 14:00:04.092628002 CET6532353192.168.2.58.8.8.8
                                          Feb 7, 2023 14:00:04.113540888 CET53653238.8.8.8192.168.2.5
                                          Feb 7, 2023 14:00:09.282095909 CET6344653192.168.2.58.8.8.8
                                          Feb 7, 2023 14:00:09.300489902 CET53634468.8.8.8192.168.2.5
                                          Feb 7, 2023 14:00:14.467171907 CET5675153192.168.2.58.8.8.8
                                          Feb 7, 2023 14:00:14.485213041 CET53567518.8.8.8192.168.2.5
                                          Feb 7, 2023 14:00:35.679114103 CET6097553192.168.2.58.8.8.8
                                          Feb 7, 2023 14:00:35.700711012 CET53609758.8.8.8192.168.2.5
                                          Feb 7, 2023 14:00:41.407455921 CET5922053192.168.2.58.8.8.8
                                          Feb 7, 2023 14:00:41.429548979 CET53592208.8.8.8192.168.2.5
                                          Feb 7, 2023 14:00:46.845959902 CET5668253192.168.2.58.8.8.8
                                          Feb 7, 2023 14:00:46.865693092 CET53566828.8.8.8192.168.2.5
                                          Feb 7, 2023 14:01:07.633317947 CET6265953192.168.2.58.8.8.8
                                          Feb 7, 2023 14:01:07.651314974 CET53626598.8.8.8192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Feb 7, 2023 13:59:31.679389000 CET192.168.2.58.8.8.80xb8e1Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          Feb 7, 2023 13:59:37.159048080 CET192.168.2.58.8.8.80xc0cdStandard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          Feb 7, 2023 13:59:42.715939045 CET192.168.2.58.8.8.80xc75eStandard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:04.092628002 CET192.168.2.58.8.8.80x1f49Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:09.282095909 CET192.168.2.58.8.8.80x26dbStandard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:14.467171907 CET192.168.2.58.8.8.80x8558Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:35.679114103 CET192.168.2.58.8.8.80xdfdcStandard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:41.407455921 CET192.168.2.58.8.8.80x1d80Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:46.845959902 CET192.168.2.58.8.8.80x7a18Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:01:07.633317947 CET192.168.2.58.8.8.80xd446Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Feb 7, 2023 13:59:31.699139118 CET8.8.8.8192.168.2.50xb8e1No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                          Feb 7, 2023 13:59:37.179442883 CET8.8.8.8192.168.2.50xc0cdNo error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                          Feb 7, 2023 13:59:42.735929966 CET8.8.8.8192.168.2.50xc75eNo error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:04.113540888 CET8.8.8.8192.168.2.50x1f49No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:09.300489902 CET8.8.8.8192.168.2.50x26dbNo error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:14.485213041 CET8.8.8.8192.168.2.50x8558No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:35.700711012 CET8.8.8.8192.168.2.50xdfdcNo error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:41.429548979 CET8.8.8.8192.168.2.50x1d80No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:00:46.865693092 CET8.8.8.8192.168.2.50x7a18No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                          Feb 7, 2023 14:01:07.651314974 CET8.8.8.8192.168.2.50xd446No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:13:59:04
                                          Start date:07/02/2023
                                          Path:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          Imagebase:0xe60000
                                          File size:705536 bytes
                                          MD5 hash:AC2609D2181F756550E3C180329B121C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:1
                                          Start time:13:59:15
                                          Start date:07/02/2023
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe
                                          Imagebase:0xe80000
                                          File size:430592 bytes
                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          Target ID:2
                                          Start time:13:59:15
                                          Start date:07/02/2023
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7fcd70000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:3
                                          Start time:13:59:15
                                          Start date:07/02/2023
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                          Imagebase:0xe80000
                                          File size:430592 bytes
                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          Target ID:4
                                          Start time:13:59:15
                                          Start date:07/02/2023
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7fcd70000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:5
                                          Start time:13:59:15
                                          Start date:07/02/2023
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp
                                          Imagebase:0x820000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:6
                                          Start time:13:59:15
                                          Start date:07/02/2023
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7fcd70000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:7
                                          Start time:13:59:17
                                          Start date:07/02/2023
                                          Path:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                          Imagebase:0x7ff7fcd70000
                                          File size:705536 bytes
                                          MD5 hash:AC2609D2181F756550E3C180329B121C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 67%, ReversingLabs
                                          Reputation:low

                                          Target ID:8
                                          Start time:13:59:24
                                          Start date:07/02/2023
                                          Path:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          Imagebase:0x1a0000
                                          File size:705536 bytes
                                          MD5 hash:AC2609D2181F756550E3C180329B121C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low

                                          Target ID:9
                                          Start time:13:59:24
                                          Start date:07/02/2023
                                          Path:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          Imagebase:0x2b0000
                                          File size:705536 bytes
                                          MD5 hash:AC2609D2181F756550E3C180329B121C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low

                                          Target ID:10
                                          Start time:13:59:24
                                          Start date:07/02/2023
                                          Path:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\cRC31pEDkr.exe
                                          Imagebase:0x450000
                                          File size:705536 bytes
                                          MD5 hash:AC2609D2181F756550E3C180329B121C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                          Reputation:low

                                          Target ID:12
                                          Start time:13:59:36
                                          Start date:07/02/2023
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmp
                                          Imagebase:0x820000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:13
                                          Start time:13:59:36
                                          Start date:07/02/2023
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7fcd70000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:14
                                          Start time:13:59:43
                                          Start date:07/02/2023
                                          Path:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                          Imagebase:0x750000
                                          File size:705536 bytes
                                          MD5 hash:AC2609D2181F756550E3C180329B121C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:11.1%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:156
                                            Total number of Limit Nodes:15
                                            execution_graph 17987 30c9958 17988 30c9959 17987->17988 17992 30c9a40 17988->17992 18000 30c9a50 17988->18000 17989 30c9967 17993 30c9a44 17992->17993 17994 30c9a7b 17993->17994 18008 30c9cd8 17993->18008 18012 30c9ccb 17993->18012 17994->17989 17995 30c9a73 17995->17994 17996 30c9c78 GetModuleHandleW 17995->17996 17997 30c9ca5 17996->17997 17997->17989 18001 30c9a51 18000->18001 18002 30c9a7b 18001->18002 18006 30c9cd8 LoadLibraryExW 18001->18006 18007 30c9ccb LoadLibraryExW 18001->18007 18002->17989 18003 30c9a73 18003->18002 18004 30c9c78 GetModuleHandleW 18003->18004 18005 30c9ca5 18004->18005 18005->17989 18006->18003 18007->18003 18009 30c9cdd 18008->18009 18010 30c9d11 18009->18010 18016 30c8fc0 18009->18016 18010->17995 18014 30c9cd8 18012->18014 18013 30c9d11 18013->17995 18014->18013 18015 30c8fc0 LoadLibraryExW 18014->18015 18015->18013 18017 30c9eb8 LoadLibraryExW 18016->18017 18019 30c9f31 18017->18019 18019->18010 18112 30cbf78 18113 30cbf7d DuplicateHandle 18112->18113 18114 30cc00e 18113->18114 17908 7ed6a28 17909 7ed6a42 17908->17909 17922 7ed70a0 17909->17922 17926 7ed7421 17909->17926 17930 7ed71d1 17909->17930 17934 7ed7156 17909->17934 17939 7ed7477 17909->17939 17943 7ed6f85 17909->17943 17947 7ed6f29 17909->17947 17952 7ed6fa9 17909->17952 17956 7ed710e 17909->17956 17960 7ed703d 17909->17960 17964 7ed7240 17909->17964 17924 7ed6f91 17922->17924 17923 7ed7037 17924->17923 17967 7bf7cd0 17924->17967 17927 7ed7841 17926->17927 17971 7bf7df0 17927->17971 17932 7ed6f91 17930->17932 17931 7ed7037 17932->17931 17933 7bf7cd0 WriteProcessMemory 17932->17933 17933->17932 17935 7ed7172 17934->17935 17936 7ed6a4a 17935->17936 17975 7ed80b0 17935->17975 17941 7ed6f91 17939->17941 17940 7ed7037 17941->17940 17942 7bf7cd0 WriteProcessMemory 17941->17942 17942->17941 17945 7ed6f91 17943->17945 17944 7ed7037 17945->17944 17946 7bf7cd0 WriteProcessMemory 17945->17946 17946->17945 17983 7bf7fe8 17947->17983 17953 7ed6f91 17952->17953 17953->17952 17954 7ed7037 17953->17954 17955 7bf7cd0 WriteProcessMemory 17953->17955 17955->17953 17957 7ed7118 17956->17957 17959 7ed80b0 ResumeThread 17957->17959 17958 7ed7b37 17959->17958 17961 7ed6f91 17960->17961 17962 7ed7037 17961->17962 17963 7bf7cd0 WriteProcessMemory 17961->17963 17963->17961 17966 7bf7cd0 WriteProcessMemory 17964->17966 17965 7ed7261 17966->17965 17968 7bf7d18 WriteProcessMemory 17967->17968 17970 7bf7d6f 17968->17970 17970->17924 17972 7bf7e3b ReadProcessMemory 17971->17972 17974 7bf7e7f 17972->17974 17976 7ed80c5 17975->17976 17979 7bf7968 17976->17979 17980 7bf79a8 ResumeThread 17979->17980 17982 7bf79d9 17980->17982 17984 7bf8071 CreateProcessA 17983->17984 17986 7bf8233 17984->17986 18020 7ed80f8 18021 7ed8283 18020->18021 18022 7ed811e 18020->18022 18022->18021 18024 7ed8378 PostMessageW 18022->18024 18025 7ed83e4 18024->18025 18025->18022 18115 7bf7a48 18116 7bf7a8d SetThreadContext 18115->18116 18118 7bf7ad5 18116->18118 18026 30cbd50 18027 30cbd51 GetCurrentProcess 18026->18027 18029 30cbdca GetCurrentThread 18027->18029 18030 30cbdc3 18027->18030 18031 30cbe07 GetCurrentProcess 18029->18031 18032 30cbe00 18029->18032 18030->18029 18033 30cbe3d 18031->18033 18032->18031 18034 30cbe65 GetCurrentThreadId 18033->18034 18035 30cbe96 18034->18035 18036 30c40d0 18037 30c40d1 18036->18037 18038 30c40ee 18037->18038 18042 30c41e0 18037->18042 18047 30c3c64 18038->18047 18040 30c410d 18043 30c41e4 18042->18043 18051 30c42e0 18043->18051 18055 30c42d1 18043->18055 18048 30c3c6f 18047->18048 18063 30c6ac4 18048->18063 18050 30c6ebf 18050->18040 18053 30c42e1 18051->18053 18052 30c43e4 18052->18052 18053->18052 18059 30c3de8 18053->18059 18056 30c42d4 18055->18056 18057 30c43e4 18056->18057 18058 30c3de8 CreateActCtxA 18056->18058 18057->18057 18058->18057 18060 30c5370 CreateActCtxA 18059->18060 18062 30c5433 18060->18062 18064 30c6acf 18063->18064 18067 30c6b54 18064->18067 18066 30c70ed 18066->18050 18068 30c6b5f 18067->18068 18071 30c6b84 18068->18071 18070 30c71c2 18070->18066 18072 30c6b8f 18071->18072 18075 30c6bb4 18072->18075 18074 30c72c2 18074->18070 18076 30c6bbf 18075->18076 18077 30c7a1c 18076->18077 18079 30cba79 18076->18079 18077->18074 18080 30cba80 18079->18080 18081 30cbacd 18080->18081 18084 30cbc38 18080->18084 18088 30cbc27 18080->18088 18081->18077 18085 30cbc3d 18084->18085 18086 30cbc7f 18085->18086 18092 30ca6dc 18085->18092 18086->18081 18089 30cbc38 18088->18089 18090 30cbc7f 18089->18090 18091 30ca6dc 2 API calls 18089->18091 18090->18081 18091->18090 18093 30ca6e7 18092->18093 18095 30cc570 18093->18095 18096 30ca7c4 18093->18096 18095->18095 18097 30ca7cf 18096->18097 18098 30c6bb4 2 API calls 18097->18098 18099 30cc9df 18098->18099 18102 30ce394 18099->18102 18103 30cca18 18102->18103 18104 30ce3ad 18102->18104 18103->18095 18106 30ce7e8 LoadLibraryExW GetModuleHandleW 18104->18106 18107 30ce7d7 LoadLibraryExW GetModuleHandleW 18104->18107 18105 30ce3e5 18106->18105 18107->18105 18108 7bf7be0 18109 7bf7c20 VirtualAllocEx 18108->18109 18111 7bf7c5d 18109->18111

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 030CBDB0
                                            • GetCurrentThread.KERNEL32 ref: 030CBDED
                                            • GetCurrentProcess.KERNEL32 ref: 030CBE2A
                                            • GetCurrentThreadId.KERNEL32 ref: 030CBE83
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 94cf8c8b3d26a3195287839205c660fac7faad8e24b8b30cf47ac49c050f151b
                                            • Instruction ID: 0f61617f34142c261ca75a7057d61e4f1c792d33ff23fdfd150378affeb166d8
                                            • Opcode Fuzzy Hash: 94cf8c8b3d26a3195287839205c660fac7faad8e24b8b30cf47ac49c050f151b
                                            • Instruction Fuzzy Hash: EE5144B09117498FDB54CFAAD589BDEBFF1EF48300F24846AE409A7260D7745884CB6A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 030CBDB0
                                            • GetCurrentThread.KERNEL32 ref: 030CBDED
                                            • GetCurrentProcess.KERNEL32 ref: 030CBE2A
                                            • GetCurrentThreadId.KERNEL32 ref: 030CBE83
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: fd344fd7f5a0243043724d1fa8aeb486126185afc67ee386e965dce8d27a0e81
                                            • Instruction ID: ef60eb7f741ce8aaded59c086e54f2d49ccd781f714fc50c01a4b6229cde47d9
                                            • Opcode Fuzzy Hash: fd344fd7f5a0243043724d1fa8aeb486126185afc67ee386e965dce8d27a0e81
                                            • Instruction Fuzzy Hash: 525143B0D116498FDB14CFAAD589BDEBFF1BF88304F248469E409A7250D7749884CB69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 67 7bf7fe8-7bf807d 69 7bf807f-7bf8089 67->69 70 7bf80b6-7bf80d6 67->70 69->70 71 7bf808b-7bf808d 69->71 75 7bf810f-7bf813e 70->75 76 7bf80d8-7bf80e2 70->76 73 7bf808f-7bf8099 71->73 74 7bf80b0-7bf80b3 71->74 77 7bf809d-7bf80ac 73->77 78 7bf809b 73->78 74->70 84 7bf8177-7bf8231 CreateProcessA 75->84 85 7bf8140-7bf814a 75->85 76->75 80 7bf80e4-7bf80e6 76->80 77->77 79 7bf80ae 77->79 78->77 79->74 81 7bf8109-7bf810c 80->81 82 7bf80e8-7bf80f2 80->82 81->75 86 7bf80f6-7bf8105 82->86 87 7bf80f4 82->87 98 7bf823a-7bf82c0 84->98 99 7bf8233-7bf8239 84->99 85->84 88 7bf814c-7bf814e 85->88 86->86 89 7bf8107 86->89 87->86 90 7bf8171-7bf8174 88->90 91 7bf8150-7bf815a 88->91 89->81 90->84 93 7bf815e-7bf816d 91->93 94 7bf815c 91->94 93->93 95 7bf816f 93->95 94->93 95->90 109 7bf82c2-7bf82c6 98->109 110 7bf82d0-7bf82d4 98->110 99->98 109->110 111 7bf82c8 109->111 112 7bf82d6-7bf82da 110->112 113 7bf82e4-7bf82e8 110->113 111->110 112->113 114 7bf82dc 112->114 115 7bf82ea-7bf82ee 113->115 116 7bf82f8-7bf82fc 113->116 114->113 115->116 117 7bf82f0 115->117 118 7bf830e-7bf8315 116->118 119 7bf82fe-7bf8304 116->119 117->116 120 7bf832c 118->120 121 7bf8317-7bf8326 118->121 119->118 121->120
                                            APIs
                                            • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07BF821E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.358828735.0000000007BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7bf0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: e55459d583cc12d93b3b5f16a7a3e7206ef362c1fb282d78abd5dbc3cfed22b0
                                            • Instruction ID: a3c6a3baab9f48f9772eeb3876c8eec45004ed8a012fe09dc49ccd2ea3ced3c7
                                            • Opcode Fuzzy Hash: e55459d583cc12d93b3b5f16a7a3e7206ef362c1fb282d78abd5dbc3cfed22b0
                                            • Instruction Fuzzy Hash: 90914AB1D00619CFEB10DFA8C8817DEBBB2FF48714F1485A9E909A7250DB749989CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 123 30c9a50-30c9a65 call 30c8f58 127 30c9a7b-30c9a7f 123->127 128 30c9a67 123->128 129 30c9a81-30c9a8b 127->129 130 30c9a93-30c9ad4 127->130 177 30c9a6d call 30c9cd8 128->177 178 30c9a6d call 30c9ccb 128->178 129->130 135 30c9ad6-30c9ade 130->135 136 30c9ae1-30c9aef 130->136 131 30c9a73-30c9a75 131->127 132 30c9bb0-30c9c70 131->132 172 30c9c78-30c9ca3 GetModuleHandleW 132->172 173 30c9c72-30c9c75 132->173 135->136 138 30c9af1-30c9af6 136->138 139 30c9b13-30c9b15 136->139 141 30c9af8-30c9aff call 30c8f64 138->141 142 30c9b01 138->142 140 30c9b18-30c9b1f 139->140 143 30c9b2c-30c9b33 140->143 144 30c9b21-30c9b29 140->144 145 30c9b03-30c9b11 141->145 142->145 148 30c9b35-30c9b3d 143->148 149 30c9b40-30c9b49 call 30c8f74 143->149 144->143 145->140 148->149 154 30c9b4b-30c9b53 149->154 155 30c9b56-30c9b5b 149->155 154->155 157 30c9b5d-30c9b64 155->157 158 30c9b79-30c9b7d 155->158 157->158 160 30c9b66-30c9b76 call 30c8f84 call 30c8f94 157->160 161 30c9b83-30c9b86 158->161 160->158 163 30c9b88-30c9ba6 161->163 164 30c9ba9-30c9baf 161->164 163->164 174 30c9cac-30c9cc0 172->174 175 30c9ca5-30c9cab 172->175 173->172 175->174 177->131 178->131
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 030C9C96
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 2069b43d2fafb8b1d02ea7d2b67aac1f3f3478e981d98f7d0ce5dd3851599650
                                            • Instruction ID: 38aa66f28cb96218e4592d32699abb15ce711b9677b2f6590565f9b524c43190
                                            • Opcode Fuzzy Hash: 2069b43d2fafb8b1d02ea7d2b67aac1f3f3478e981d98f7d0ce5dd3851599650
                                            • Instruction Fuzzy Hash: C47146B0A11B459FDB64CF6AC15079ABBF5BF88300F14892ED48ADBA50D734E806CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 179 30c5367-30c536c 180 30c52fd-30c5331 179->180 181 30c536e 179->181 185 30c533a-30c535b 180->185 186 30c5333-30c5339 180->186 183 30c5375-30c5431 CreateActCtxA 181->183 184 30c5370-30c5374 181->184 189 30c543a-30c5494 183->189 190 30c5433-30c5439 183->190 184->183 186->185 197 30c5496-30c5499 189->197 198 30c54a3-30c54a7 189->198 190->189 197->198 199 30c54b8 198->199 200 30c54a9-30c54b5 198->200 202 30c54b9 199->202 200->199 202->202
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 030C5421
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: c5f7c79d71bb348948abeb70f9c2fbe2e6450d5540259c6de0ef2b23d1547f79
                                            • Instruction ID: 72eab5c1ccf021288bb0e4a30c915db9625785610539bfb0c7867a144c8a1db0
                                            • Opcode Fuzzy Hash: c5f7c79d71bb348948abeb70f9c2fbe2e6450d5540259c6de0ef2b23d1547f79
                                            • Instruction Fuzzy Hash: 165113B1C10658CFDB10CFAAC8847CEBBF5BF49314F2480AAD409AB251D7746985DFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 203 30c3de8-30c5431 CreateActCtxA 207 30c543a-30c5494 203->207 208 30c5433-30c5439 203->208 215 30c5496-30c5499 207->215 216 30c54a3-30c54a7 207->216 208->207 215->216 217 30c54b8 216->217 218 30c54a9-30c54b5 216->218 220 30c54b9 217->220 218->217 220->220
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 030C5421
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 3647283649f828bf5fa6ff046d1cfc4400db41f5b88a9f0c615d47fe0a157e18
                                            • Instruction ID: ce14369409093ce3ab07d82b655445724340c381e667da1064a61f16b9116f30
                                            • Opcode Fuzzy Hash: 3647283649f828bf5fa6ff046d1cfc4400db41f5b88a9f0c615d47fe0a157e18
                                            • Instruction Fuzzy Hash: 434102B0C1161CCFDB24DFAAC884BCEBBB5BF49304F20806AD409AB251D7B56946DF94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 221 7bf7cd0-7bf7d1e 223 7bf7d2e-7bf7d6d WriteProcessMemory 221->223 224 7bf7d20-7bf7d2c 221->224 226 7bf7d6f-7bf7d75 223->226 227 7bf7d76-7bf7da6 223->227 224->223 226->227
                                            APIs
                                            • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07BF7D60
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.358828735.0000000007BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7bf0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 408a5ba8d1a3d3d03f0f60863648ef96c6a9bbc376b8a4e05374daaf72be466e
                                            • Instruction ID: 487f3efeb42ead97c82f4fdf3be1a0a59c3232e2f1699eb333a018c96033b30f
                                            • Opcode Fuzzy Hash: 408a5ba8d1a3d3d03f0f60863648ef96c6a9bbc376b8a4e05374daaf72be466e
                                            • Instruction Fuzzy Hash: 6D212AB59003599FDF10CFAAC8847EEBBF5FF48310F50842AE919A7240C7789944DBA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 231 30cbf70-30cbf76 232 30cbf7d-30cc00c DuplicateHandle 231->232 233 30cbf78-30cbf7c 231->233 234 30cc00e-30cc014 232->234 235 30cc015-30cc032 232->235 233->232 234->235
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030CBFFF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: fefa36c1223cb2fbda273f4f90133151b019e97202a58862b689a356139a2b43
                                            • Instruction ID: 5c20964ba43f07be3e99b8b41023fec2de1420b310ca091fb71b83eb82dc3671
                                            • Opcode Fuzzy Hash: fefa36c1223cb2fbda273f4f90133151b019e97202a58862b689a356139a2b43
                                            • Instruction Fuzzy Hash: 8C2103B5D01248AFDB10CFAAD984ADEFBF8EB48320F14845AE815B7310D374A940DFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 248 7bf7df0-7bf7e7d ReadProcessMemory 251 7bf7e7f-7bf7e85 248->251 252 7bf7e86-7bf7eb6 248->252 251->252
                                            APIs
                                            • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07BF7E70
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.358828735.0000000007BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7bf0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: d46d052814295d0ee65317f0204ae4781d5a4a8acd0727fd96ab9e4fe46cf1cf
                                            • Instruction ID: b8c367535425288a805e0a067d37de8723b5659491cf84adee6cdd2283519ca5
                                            • Opcode Fuzzy Hash: d46d052814295d0ee65317f0204ae4781d5a4a8acd0727fd96ab9e4fe46cf1cf
                                            • Instruction Fuzzy Hash: 002137B1D003599FDB10DFAAC880BEEBBF5FF48310F50842AE519A7250C7799A45DBA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 238 7bf7a48-7bf7a93 240 7bf7a95-7bf7aa1 238->240 241 7bf7aa3-7bf7ad3 SetThreadContext 238->241 240->241 243 7bf7adc-7bf7b0c 241->243 244 7bf7ad5-7bf7adb 241->244 244->243
                                            APIs
                                            • SetThreadContext.KERNEL32(?,00000000), ref: 07BF7AC6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.358828735.0000000007BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7bf0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: ContextThread
                                            • String ID:
                                            • API String ID: 1591575202-0
                                            • Opcode ID: 81356821dee5b0816affab4ee84100a5ddb9d06d2adb18be7513a1652ac9bc81
                                            • Instruction ID: 8b5d94508af7d02a7a103ef45268d7f1def5c3fed88defa3e9fd6f46e15be367
                                            • Opcode Fuzzy Hash: 81356821dee5b0816affab4ee84100a5ddb9d06d2adb18be7513a1652ac9bc81
                                            • Instruction Fuzzy Hash: A82118B1D003099FDB10DFAAC8847EEBBF4EF48714F54846AD519A7240CB78AA45CFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 256 30cbf78-30cc00c DuplicateHandle 258 30cc00e-30cc014 256->258 259 30cc015-30cc032 256->259 258->259
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030CBFFF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: d58e265bd40dfaff997a33e1c687ec5236c042d918ba12fd99ddfc3bfcdaaefc
                                            • Instruction ID: 9efd83cf8fd9e8b655dd97316d69b1febcbc386c133dc162d219c0fc570916ef
                                            • Opcode Fuzzy Hash: d58e265bd40dfaff997a33e1c687ec5236c042d918ba12fd99ddfc3bfcdaaefc
                                            • Instruction Fuzzy Hash: DE21E2B59002489FDB10CFAAD984ADEFBF8EB48324F14841AE919A7310D374A944DFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 262 30c8fc0-30c9ef8 264 30c9efa-30c9efd 262->264 265 30c9f00-30c9f2f LoadLibraryExW 262->265 264->265 266 30c9f38-30c9f55 265->266 267 30c9f31-30c9f37 265->267 267->266
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,030C9D11,00000800,00000000,00000000), ref: 030C9F22
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 43a154f5e275d7e528bd2ef243def649f5930bbb50c68efca409d675b13bf84e
                                            • Instruction ID: 0cf3fcf4fbd78fcfeda4adee4bdd3aa5b9ddb30e544e3a2d5ff58c79be48ff11
                                            • Opcode Fuzzy Hash: 43a154f5e275d7e528bd2ef243def649f5930bbb50c68efca409d675b13bf84e
                                            • Instruction Fuzzy Hash: AD1126B2D102498FCB10CF9AD484BDEFBF4EB98314F14842EE815A7200C3B4A545CFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 270 30c9eb3-30c9ef8 272 30c9efa-30c9efd 270->272 273 30c9f00-30c9f2f LoadLibraryExW 270->273 272->273 274 30c9f38-30c9f55 273->274 275 30c9f31-30c9f37 273->275 275->274
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,030C9D11,00000800,00000000,00000000), ref: 030C9F22
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 0d3a7d49f2a1a69618254d8afcc4fc567371fa7deb4980698174956ff93ca400
                                            • Instruction ID: e5da8265d7ce6299d9bc1d7cd46d224aeb7f2098ffc35370660bb704192a5acd
                                            • Opcode Fuzzy Hash: 0d3a7d49f2a1a69618254d8afcc4fc567371fa7deb4980698174956ff93ca400
                                            • Instruction Fuzzy Hash: A61123B2D002498FCB10CF9AC884BDEFBF4EB88320F14842EE415A7200C378A545CFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 278 7bf7be0-7bf7c5b VirtualAllocEx 281 7bf7c5d-7bf7c63 278->281 282 7bf7c64-7bf7c89 278->282 281->282
                                            APIs
                                            • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07BF7C4E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.358828735.0000000007BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7bf0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: ebb70de3738dca1d0a6cc0b8c4168e72044b6cfe47b623680f2328d4916bdd3f
                                            • Instruction ID: cc0cc7fe180077e0dea4f49c63ae1919710b7bf9fdf18ebe9feb529ef8a0bfed
                                            • Opcode Fuzzy Hash: ebb70de3738dca1d0a6cc0b8c4168e72044b6cfe47b623680f2328d4916bdd3f
                                            • Instruction Fuzzy Hash: E31137B29002499FDB10DFAAC8447DFBFF5EF48720F148819E519A7250CB75AA44DFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.358828735.0000000007BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7bf0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: b98390753497dd8767506856f69dcf6082bbdddc7c9a8620cfae24d16fbeb4d4
                                            • Instruction ID: 800febba64b618ba600a8007fea7cc2979e2bddf2690927dbac951a8f58c8ced
                                            • Opcode Fuzzy Hash: b98390753497dd8767506856f69dcf6082bbdddc7c9a8620cfae24d16fbeb4d4
                                            • Instruction Fuzzy Hash: 7B110AB1D003498FDB10DFAAC8457EEFBF5EF88724F148869D515A7240CB75A944CBA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 030C9C96
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 062be7085c27784c33b78fb85fc109f2508b1793852ff0afbc9d9ef64fdf46b8
                                            • Instruction ID: cde66aa0c0fc01d7f337020a438ad323fc76e14d38e9be3e2580188c35e2c985
                                            • Opcode Fuzzy Hash: 062be7085c27784c33b78fb85fc109f2508b1793852ff0afbc9d9ef64fdf46b8
                                            • Instruction Fuzzy Hash: 981110B2C002498FCB10CF9AC584BDEFBF4AF89324F14846AD419B7610C374A545CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • PostMessageW.USER32(?,?,?,?), ref: 07ED83D5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.359089388.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ed0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 8544c604a0335aea90cbd0f7671c163df22b259e190884a2894803a5ad1d2143
                                            • Instruction ID: 9c3cc348721803b8ae7e4f799dd79e3e5f988f5a07d1ae6f9295a1079c025ce0
                                            • Opcode Fuzzy Hash: 8544c604a0335aea90cbd0f7671c163df22b259e190884a2894803a5ad1d2143
                                            • Instruction Fuzzy Hash: 7011E8B58003499FDB10CF9AC984BDFFBF8EB48324F108519E555A7600C374A985CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.359089388.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ed0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: d
                                            • API String ID: 0-2564639436
                                            • Opcode ID: 20fbd1150b7f7b51e361acfda38776ed12948d749056ecf4faace24bb16d37a4
                                            • Instruction ID: c3e58dc8631181dec793a0abf60246e7f9bc71e9036da92d82380770c571a7bc
                                            • Opcode Fuzzy Hash: 20fbd1150b7f7b51e361acfda38776ed12948d749056ecf4faace24bb16d37a4
                                            • Instruction Fuzzy Hash: 4A4143B1D01A58CFE758CF6B8C4479AFAF7AFC9201F14D1B9840CAA255EB304986CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d5a118c61477d27e6e1b756280b6cfe1e6c7f19389617bda0b1ee05309dd8589
                                            • Instruction ID: 73bc413ae0f16a72ca94664c4d26dd99b14c80763822675493b300583f2a4c38
                                            • Opcode Fuzzy Hash: d5a118c61477d27e6e1b756280b6cfe1e6c7f19389617bda0b1ee05309dd8589
                                            • Instruction Fuzzy Hash: 9812E9F1411746CBD318EF65E8981893BA3F74AB28F906308D1612F6D9D7B811CAEF64
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 185df9e06d64cc5d9f41644ecbccebb2ffcd9a3623c41e58633a25fad704206c
                                            • Instruction ID: fd0f1333a262e0238f4a564f4d20249dde7dabb25d77d46132dc11107412f5a0
                                            • Opcode Fuzzy Hash: 185df9e06d64cc5d9f41644ecbccebb2ffcd9a3623c41e58633a25fad704206c
                                            • Instruction Fuzzy Hash: C4A17F36E112598FCF05DFA5C8445DEBBF2FFC9301B15856AE805BB260EB31A946CB80
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.345509747.00000000030C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30c0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 83cf7c90a305d886d425c657bb007b55490da74d28e881e1fb36f1f7bffb42fc
                                            • Instruction ID: f4d9419c418fbc21c0f0b7b0080700ffd19a8b498f2618aeaa9e41c3e3d36b3d
                                            • Opcode Fuzzy Hash: 83cf7c90a305d886d425c657bb007b55490da74d28e881e1fb36f1f7bffb42fc
                                            • Instruction Fuzzy Hash: 56C14DB1411746CBD718EF65E8881897BB3FB8AB24F505308D1616B6D8D7B810CAEFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.358828735.0000000007BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7bf0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 226c335d31b2387cfc5056ec35204243691d1e545c92066342477684fdfb6276
                                            • Instruction ID: ee7cc65767dc32a4755eea8f0b223dc077dc94ef9c26d6691d934ec0199f1a0f
                                            • Opcode Fuzzy Hash: 226c335d31b2387cfc5056ec35204243691d1e545c92066342477684fdfb6276
                                            • Instruction Fuzzy Hash: 994160B1D05A588FE71DCF6B8C4068AFBF3AFC5200F18C1BBD458AA265EB3409468F11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.359089388.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ed0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f4dffbf3ed5944fa9fdb0474198cf2cc9dcdebd34944932dd31fa4c932ac491b
                                            • Instruction ID: 61f56eda4d9c466ad0fc522fad22e131898196016961838438ff992834fccee4
                                            • Opcode Fuzzy Hash: f4dffbf3ed5944fa9fdb0474198cf2cc9dcdebd34944932dd31fa4c932ac491b
                                            • Instruction Fuzzy Hash: 504151B1D05A548FE759CF678C4028AFBF3AFC9211F18C1BAC44C9A255EB3409868F51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.358828735.0000000007BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7bf0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ae367e695a5eefa490f24da940aa79663dad7e2d99f2c7ba76e9a0740b04e914
                                            • Instruction ID: 8d2e354e3f1331e7631e6a63377b72ec0b653c17290fa82999e92469d1c26c8e
                                            • Opcode Fuzzy Hash: ae367e695a5eefa490f24da940aa79663dad7e2d99f2c7ba76e9a0740b04e914
                                            • Instruction Fuzzy Hash: A84175B1D05A588BEB6CCF6BCD4469EFAF3AFC9201F14C1BA941DAB255DB7009458F00
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:11.7%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:235
                                            Total number of Limit Nodes:7
                                            execution_graph 26683 52a4be8 26684 52a4c15 26683->26684 26693 52a48ec 26684->26693 26686 52a4ca8 26700 52a48fc 26686->26700 26688 52a4cda 26706 52a490c 26688->26706 26690 52a4d0c 26691 52a490c 4 API calls 26690->26691 26692 52a4d3e 26691->26692 26695 52a48f7 26693->26695 26694 52a578e 26694->26686 26695->26694 26710 1276b84 26695->26710 26714 12772f1 26695->26714 26719 1277211 26695->26719 26696 52a57e5 26696->26686 26701 52a4907 26700->26701 26703 1276b84 4 API calls 26701->26703 26704 1277211 4 API calls 26701->26704 26705 12772f1 4 API calls 26701->26705 26702 52a57e5 26702->26688 26703->26702 26704->26702 26705->26702 26707 52a4917 26706->26707 26854 52a4a3c 26707->26854 26709 52a5a01 26709->26690 26711 1276b8f 26710->26711 26723 1276bb4 26711->26723 26713 12772c2 26713->26696 26715 12772b0 26714->26715 26716 12772ff 26714->26716 26717 1276bb4 4 API calls 26715->26717 26716->26696 26718 12772c2 26717->26718 26718->26696 26720 1277220 26719->26720 26721 1276bb4 4 API calls 26720->26721 26722 12772c2 26721->26722 26722->26696 26724 1276bbf 26723->26724 26726 12779de 26724->26726 26734 1279922 26724->26734 26738 52a5c31 26724->26738 26743 52a5c40 26724->26743 26747 52a5840 26724->26747 26752 52a5850 26724->26752 26725 1277a1c 26725->26713 26726->26725 26756 127ba88 26726->26756 26761 127ba79 26726->26761 26766 1279949 26734->26766 26770 1279958 26734->26770 26735 1279936 26735->26726 26739 52a5c3a 26738->26739 26740 52a5c4e 26738->26740 26793 52a60b0 26739->26793 26796 52a60a1 26739->26796 26740->26726 26745 52a60b0 2 API calls 26743->26745 26746 52a60a1 2 API calls 26743->26746 26744 52a5c4e 26744->26726 26745->26744 26746->26744 26748 52a5850 26747->26748 26750 1279949 2 API calls 26748->26750 26751 1279958 2 API calls 26748->26751 26749 52a585d 26749->26726 26750->26749 26751->26749 26754 1279949 2 API calls 26752->26754 26755 1279958 2 API calls 26752->26755 26753 52a585d 26753->26726 26754->26753 26755->26753 26757 127baa9 26756->26757 26758 127bacd 26757->26758 26800 127bc27 26757->26800 26804 127bc38 26757->26804 26758->26725 26762 127baa9 26761->26762 26763 127bacd 26762->26763 26764 127bc27 4 API calls 26762->26764 26765 127bc38 4 API calls 26762->26765 26763->26725 26764->26763 26765->26763 26767 1279958 26766->26767 26773 1279a50 26767->26773 26768 1279967 26768->26735 26772 1279a50 2 API calls 26770->26772 26771 1279967 26771->26735 26772->26771 26774 1279a63 26773->26774 26775 1279a7b 26774->26775 26781 1279cca 26774->26781 26785 1279cd8 26774->26785 26775->26768 26776 1279a73 26776->26775 26777 1279c78 GetModuleHandleW 26776->26777 26778 1279ca5 26777->26778 26778->26768 26782 1279cec 26781->26782 26783 1279d11 26782->26783 26789 1278fc0 26782->26789 26783->26776 26786 1279cec 26785->26786 26787 1279d11 26786->26787 26788 1278fc0 LoadLibraryExW 26786->26788 26787->26776 26788->26787 26790 1279eb8 LoadLibraryExW 26789->26790 26792 1279f31 26790->26792 26792->26783 26795 1279a50 2 API calls 26793->26795 26794 52a60bf 26794->26740 26795->26794 26797 52a60b0 26796->26797 26799 1279a50 2 API calls 26797->26799 26798 52a60bf 26798->26740 26799->26798 26802 127bc45 26800->26802 26801 127bc7f 26801->26758 26802->26801 26808 127a6dc 26802->26808 26806 127bc45 26804->26806 26805 127bc7f 26805->26758 26806->26805 26807 127a6dc 4 API calls 26806->26807 26807->26805 26809 127a6e7 26808->26809 26811 127c570 26809->26811 26812 127a7c4 26809->26812 26813 127a7cf 26812->26813 26814 1276bb4 4 API calls 26813->26814 26815 127c9df 26814->26815 26818 127e394 26815->26818 26819 127ca18 26818->26819 26820 127e3ad 26818->26820 26819->26811 26827 127e7d7 26820->26827 26832 127e7e8 26820->26832 26821 127e3e5 26835 127f1a0 26821->26835 26840 127f1b0 26821->26840 26828 127e7e2 26827->26828 26829 127e7be 26827->26829 26830 1279a50 2 API calls 26828->26830 26831 127e7f1 26828->26831 26829->26821 26830->26831 26831->26821 26833 1279a50 2 API calls 26832->26833 26834 127e7f1 26833->26834 26834->26821 26836 127f1da 26835->26836 26837 127f281 26836->26837 26845 52a0448 26836->26845 26849 52a03e0 26836->26849 26842 127f1da 26840->26842 26841 127f281 26841->26841 26842->26841 26843 52a0448 2 API calls 26842->26843 26844 52a03e0 2 API calls 26842->26844 26843->26841 26844->26841 26847 52a0498 CreateWindowExW 26845->26847 26848 52a048c CreateWindowExW 26845->26848 26846 52a047d 26846->26837 26847->26846 26848->26846 26850 52a0431 26849->26850 26851 52a047d 26850->26851 26852 52a0498 CreateWindowExW 26850->26852 26853 52a048c CreateWindowExW 26850->26853 26851->26837 26852->26851 26853->26851 26855 52a4a47 26854->26855 26858 52a4a4c 26855->26858 26857 52a5b2f 26857->26709 26859 52a4a57 26858->26859 26861 1276bb4 4 API calls 26859->26861 26863 1277740 26859->26863 26860 52a5bb4 26860->26857 26861->26860 26864 1277750 26863->26864 26866 12779de 26864->26866 26869 1279922 2 API calls 26864->26869 26870 52a5c40 2 API calls 26864->26870 26871 52a5840 2 API calls 26864->26871 26872 52a5850 2 API calls 26864->26872 26873 52a5c31 2 API calls 26864->26873 26865 1277a1c 26865->26860 26866->26865 26867 127ba79 4 API calls 26866->26867 26868 127ba88 4 API calls 26866->26868 26867->26865 26868->26865 26869->26866 26870->26866 26871->26866 26872->26866 26873->26866 26876 127bd50 26877 127bdb6 26876->26877 26878 127be65 26877->26878 26881 127bf10 26877->26881 26884 127bf00 26877->26884 26882 127bf3e 26881->26882 26887 127a764 26881->26887 26882->26878 26885 127a764 DuplicateHandle 26884->26885 26886 127bf3e 26885->26886 26886->26878 26888 127bf78 DuplicateHandle 26887->26888 26889 127c00e 26888->26889 26889->26882 26890 12740d0 26891 12740e2 26890->26891 26892 12740ee 26891->26892 26896 12741e0 26891->26896 26901 1273c64 26892->26901 26894 127410d 26897 1274205 26896->26897 26905 12742d1 26897->26905 26909 12742e0 26897->26909 26902 1273c6f 26901->26902 26917 1276ac4 26902->26917 26904 1276ebf 26904->26894 26906 1274307 26905->26906 26907 12743e4 26906->26907 26913 1273de8 26906->26913 26911 1274307 26909->26911 26910 12743e4 26910->26910 26911->26910 26912 1273de8 CreateActCtxA 26911->26912 26912->26910 26914 1275370 CreateActCtxA 26913->26914 26916 1275433 26914->26916 26918 1276acf 26917->26918 26921 1276b54 26918->26921 26920 12770ed 26920->26904 26922 1276b5f 26921->26922 26923 1276b84 4 API calls 26922->26923 26924 12771c2 26923->26924 26924->26920 26874 52a06e0 SetWindowLongW 26875 52a074c 26874->26875 26925 122d01c 26926 122d034 26925->26926 26927 122d08e 26926->26927 26932 52a1338 26926->26932 26937 52a0650 26926->26937 26942 52a0640 26926->26942 26947 52a1348 26926->26947 26933 52a1375 26932->26933 26934 52a13a7 26933->26934 26952 52a14c0 26933->26952 26957 52a14d0 26933->26957 26938 52a0676 26937->26938 26940 52a1338 2 API calls 26938->26940 26941 52a1348 2 API calls 26938->26941 26939 52a0697 26939->26927 26940->26939 26941->26939 26943 52a0676 26942->26943 26945 52a1338 2 API calls 26943->26945 26946 52a1348 2 API calls 26943->26946 26944 52a0697 26944->26927 26945->26944 26946->26944 26948 52a1375 26947->26948 26949 52a13a7 26948->26949 26950 52a14c0 2 API calls 26948->26950 26951 52a14d0 2 API calls 26948->26951 26950->26949 26951->26949 26954 52a14e4 26952->26954 26953 52a1570 26953->26934 26962 52a1588 26954->26962 26965 52a1586 26954->26965 26958 52a14e4 26957->26958 26960 52a1588 2 API calls 26958->26960 26961 52a1586 2 API calls 26958->26961 26959 52a1570 26959->26934 26960->26959 26961->26959 26963 52a1599 26962->26963 26968 52a2a20 26962->26968 26963->26953 26966 52a1599 26965->26966 26967 52a2a20 2 API calls 26965->26967 26966->26953 26967->26966 26972 52a2a50 26968->26972 26976 52a2a41 26968->26976 26969 52a2a3a 26969->26963 26973 52a2a56 26972->26973 26974 52a2aea CallWindowProcW 26973->26974 26975 52a2a99 26973->26975 26974->26975 26975->26969 26977 52a2a4a 26976->26977 26978 52a2aea CallWindowProcW 26977->26978 26979 52a2a99 26977->26979 26978->26979 26979->26969

                                            Control-flow Graph

                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 01279C96
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386818436.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_1270000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: a348e7c2d4dd3f5f3977860c899b2834ab5272a56798928e5c5794f4ff794d79
                                            • Instruction ID: f5d31eaf6094bc91f648ea064ae273e3d0785b0a5e0bfe6550355a815c57ed00
                                            • Opcode Fuzzy Hash: a348e7c2d4dd3f5f3977860c899b2834ab5272a56798928e5c5794f4ff794d79
                                            • Instruction Fuzzy Hash: F2714670A10B068FDB64DF2AC54476BBBF1BF88214F10892ED58AD7A50E735E845CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 55 1275364-127536c 56 127536e-1275431 CreateActCtxA 55->56 57 12752fd-1275331 55->57 62 1275433-1275439 56->62 63 127543a-1275494 56->63 59 1275333-1275339 57->59 60 127533a-127535b 57->60 59->60 62->63 71 1275496-1275499 63->71 72 12754a3-12754a7 63->72 71->72 73 12754a9-12754b5 72->73 74 12754b8 72->74 73->74 76 12754b9 74->76 76->76
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 01275421
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386818436.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_1270000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 42376c8005652ea3bd8f100a71921de8b336164ee7622f83eaa7be4186236029
                                            • Instruction ID: 0cea181281f3759f60aa71aa7bc13be33a30b1554b2e84f8fb72004d0355e166
                                            • Opcode Fuzzy Hash: 42376c8005652ea3bd8f100a71921de8b336164ee7622f83eaa7be4186236029
                                            • Instruction Fuzzy Hash: 0C511271D00619CFDB20CFA9C9847DEFBB1BF48314F20806AD419AB251D7746986CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 77 52a048c-52a04fe 78 52a0509-52a0510 77->78 79 52a0500-52a0506 77->79 80 52a051b-52a05ba CreateWindowExW 78->80 81 52a0512-52a0518 78->81 79->78 83 52a05bc-52a05c2 80->83 84 52a05c3-52a05fb 80->84 81->80 83->84 88 52a0608 84->88 89 52a05fd-52a0600 84->89 90 52a0609 88->90 89->88 90->90
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 052A05AA
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.392495558.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_52a0000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 2c30d39aecb8ef5b7cd1ef8f1fcc811280cbf137ea1bfec2ac2e3f8d26a704e3
                                            • Instruction ID: 6f2ec14985678f8e9bad53cb4c952b8dd2a9749317d00e178651a6b48f772a26
                                            • Opcode Fuzzy Hash: 2c30d39aecb8ef5b7cd1ef8f1fcc811280cbf137ea1bfec2ac2e3f8d26a704e3
                                            • Instruction Fuzzy Hash: FD51C2B1D10309DFDB14CFAAD884ADEBFB5BF48310F64812AE419AB210D7749985CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 91 52a0498-52a04fe 92 52a0509-52a0510 91->92 93 52a0500-52a0506 91->93 94 52a051b-52a05ba CreateWindowExW 92->94 95 52a0512-52a0518 92->95 93->92 97 52a05bc-52a05c2 94->97 98 52a05c3-52a05fb 94->98 95->94 97->98 102 52a0608 98->102 103 52a05fd-52a0600 98->103 104 52a0609 102->104 103->102 104->104
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 052A05AA
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.392495558.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_52a0000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: f27d9d713f91eebd221a2379b7f431020ae4c1af4a2552374f2a10495e824d9c
                                            • Instruction ID: 1ad07b075c65dfff31adc8497a7c955c400c45718b0441671d9eaa7d6afadbcf
                                            • Opcode Fuzzy Hash: f27d9d713f91eebd221a2379b7f431020ae4c1af4a2552374f2a10495e824d9c
                                            • Instruction Fuzzy Hash: 7B41A0B1D10309DFDB14CF9AD884ADEBBB5BF88310F64852AE419AB210D775A985CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 105 1273de8-1275431 CreateActCtxA 108 1275433-1275439 105->108 109 127543a-1275494 105->109 108->109 116 1275496-1275499 109->116 117 12754a3-12754a7 109->117 116->117 118 12754a9-12754b5 117->118 119 12754b8 117->119 118->119 121 12754b9 119->121 121->121
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 01275421
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386818436.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_1270000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: d165348964321717afa73ee33a75db22ed3a0b50951c022e6866cfae4a3381fa
                                            • Instruction ID: b1eac1f9faa83c5c93ab03f249249505e1ebd9387678519374a9ab066c6e6467
                                            • Opcode Fuzzy Hash: d165348964321717afa73ee33a75db22ed3a0b50951c022e6866cfae4a3381fa
                                            • Instruction Fuzzy Hash: E141E171D0061DCEDB24DFA9C88479EFBB5BF48304F608069D419AB251DBB56986CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 122 52a2a50-52a2a8c 124 52a2b3c-52a2b5c 122->124 125 52a2a92-52a2a97 122->125 131 52a2b5f-52a2b6c 124->131 126 52a2aea-52a2b22 CallWindowProcW 125->126 127 52a2a99-52a2ad0 125->127 129 52a2b2b-52a2b3a 126->129 130 52a2b24-52a2b2a 126->130 133 52a2ad9-52a2ae8 127->133 134 52a2ad2-52a2ad8 127->134 129->131 130->129 133->131 134->133
                                            APIs
                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 052A2B11
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.392495558.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_52a0000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: CallProcWindow
                                            • String ID:
                                            • API String ID: 2714655100-0
                                            • Opcode ID: 5162623e6d2fb7ab1852228d0beaa8fcf47f29fb9c001ebb75c27ab625469250
                                            • Instruction ID: 1c11ee73a2b93d9ebc2f652edf18de5a4d1fbf55b9591a410268700a8b001a1b
                                            • Opcode Fuzzy Hash: 5162623e6d2fb7ab1852228d0beaa8fcf47f29fb9c001ebb75c27ab625469250
                                            • Instruction Fuzzy Hash: 1641E8B9910345CFDB14CF99C589BAABBF5FF88314F248459D419AB321D774A881CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 137 127a764-127c00c DuplicateHandle 139 127c015-127c032 137->139 140 127c00e-127c014 137->140 140->139
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0127BF3E,?,?,?,?,?), ref: 0127BFFF
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386818436.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_1270000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 94e2e23bf91c967208895fcbf3057e39c1a3531acf4a95e08c7da159b582a8bc
                                            • Instruction ID: 21e69d2bef58148986a2a564995dd0c30d5a6c9f429b89c95967a0c80b544735
                                            • Opcode Fuzzy Hash: 94e2e23bf91c967208895fcbf3057e39c1a3531acf4a95e08c7da159b582a8bc
                                            • Instruction Fuzzy Hash: 2D2114B5900209DFDB10CFAAD984AEEBFF4EB48320F14801AE915B7310D374A950DFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 143 127bf70-127c00c DuplicateHandle 144 127c015-127c032 143->144 145 127c00e-127c014 143->145 145->144
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0127BF3E,?,?,?,?,?), ref: 0127BFFF
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386818436.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_1270000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: ec8c5876b3efde1aefeba6c8669cd13a52340ffff367ea079b9867dcd0ee199c
                                            • Instruction ID: d3b493462d8872a787f057bb55c74cdee3889af68da6a8072392ba000ce5e677
                                            • Opcode Fuzzy Hash: ec8c5876b3efde1aefeba6c8669cd13a52340ffff367ea079b9867dcd0ee199c
                                            • Instruction Fuzzy Hash: 8621E4B5D002099FDB10CFA9D584ADEBFF4EB48320F14845AE915B7310D375A954DFA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 148 1278fc0-1279ef8 150 1279f00-1279f2f LoadLibraryExW 148->150 151 1279efa-1279efd 148->151 152 1279f31-1279f37 150->152 153 1279f38-1279f55 150->153 151->150 152->153
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01279D11,00000800,00000000,00000000), ref: 01279F22
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386818436.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_1270000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: d864ae1342ae5b4b7ea6c1475bd3383047017343ffab110a4582f8070ea8953d
                                            • Instruction ID: 820692a68996700c072ff33612f4a3c949441a76c7b12c5c461fc9c946b1d9c7
                                            • Opcode Fuzzy Hash: d864ae1342ae5b4b7ea6c1475bd3383047017343ffab110a4582f8070ea8953d
                                            • Instruction Fuzzy Hash: C01103B69103098FDB10CF9AD444ADFBBF4AB48324F14842AE919A7200C3B8A585CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 156 1279eb2-1279ef8 157 1279f00-1279f2f LoadLibraryExW 156->157 158 1279efa-1279efd 156->158 159 1279f31-1279f37 157->159 160 1279f38-1279f55 157->160 158->157 159->160
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01279D11,00000800,00000000,00000000), ref: 01279F22
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386818436.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_1270000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: ccb7c381f4798d8f3849b1f112dc0d3ce0cf8cf99510f3b26c6b5e6b2df40204
                                            • Instruction ID: c7b913b0f2b3daecb3ce7ec8a9001c949c38993000ccab203be42b10bdca09e0
                                            • Opcode Fuzzy Hash: ccb7c381f4798d8f3849b1f112dc0d3ce0cf8cf99510f3b26c6b5e6b2df40204
                                            • Instruction Fuzzy Hash: 421123B6D002098FDB10CFAAD444BDFFBF4AB88324F14842EE519A7610C379A585CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 163 1279c30-1279c70 164 1279c72-1279c75 163->164 165 1279c78-1279ca3 GetModuleHandleW 163->165 164->165 166 1279ca5-1279cab 165->166 167 1279cac-1279cc0 165->167 166->167
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 01279C96
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386818436.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_1270000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 91e01ac0f62d2c3e162a47247119c89a5a9faef97856e2dda09afade2d0af927
                                            • Instruction ID: 806554426f2cb34700b3cd3c38d5b9ae038e74239184d09004a8874939a7ac79
                                            • Opcode Fuzzy Hash: 91e01ac0f62d2c3e162a47247119c89a5a9faef97856e2dda09afade2d0af927
                                            • Instruction Fuzzy Hash: 2311DFB6C003498FDB10CF9AD544ADEFBF4AB88224F14842AD519B7610C375A585CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 169 52a06d8-52a074a SetWindowLongW 170 52a074c-52a0752 169->170 171 52a0753-52a0767 169->171 170->171
                                            APIs
                                            • SetWindowLongW.USER32(?,?,?), ref: 052A073D
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.392495558.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_52a0000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: LongWindow
                                            • String ID:
                                            • API String ID: 1378638983-0
                                            • Opcode ID: b2ef9d2f80419ce2aa94d4a91b96e4c299e3c508208628967c1183d8abdae071
                                            • Instruction ID: 7262fb33ed4e3999ed85a93e658518e3f5c2ada38fbb05e901be2d9e988ab325
                                            • Opcode Fuzzy Hash: b2ef9d2f80419ce2aa94d4a91b96e4c299e3c508208628967c1183d8abdae071
                                            • Instruction Fuzzy Hash: F61103B68002498FDB10CF99D588BDEBBF4EF48320F24855AD459B7700C374AA44CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 173 52a06e0-52a074a SetWindowLongW 174 52a074c-52a0752 173->174 175 52a0753-52a0767 173->175 174->175
                                            APIs
                                            • SetWindowLongW.USER32(?,?,?), ref: 052A073D
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.392495558.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_52a0000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID: LongWindow
                                            • String ID:
                                            • API String ID: 1378638983-0
                                            • Opcode ID: ae342028ce0c35913ee75f2aef31b2940383fe18bb4572920d871bac7449539c
                                            • Instruction ID: 873daaa1f5b582f3a294288a4bdb0d1bcf3f8f592a0fa4a9158bac906868c6c7
                                            • Opcode Fuzzy Hash: ae342028ce0c35913ee75f2aef31b2940383fe18bb4572920d871bac7449539c
                                            • Instruction Fuzzy Hash: B111E5B58002099FDB10CF9AD588BDEBBF8EB48324F20845AD959B7700C374A944CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386264675.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_121d000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f16402310c056bda69937bbdaeb64d7fd43b9002f4b74cccad21abb3613e1d68
                                            • Instruction ID: bdf7f5e24803e09d155b9eb49b2cdd6be40620f74d488720ce5df2584a29b270
                                            • Opcode Fuzzy Hash: f16402310c056bda69937bbdaeb64d7fd43b9002f4b74cccad21abb3613e1d68
                                            • Instruction Fuzzy Hash: 9C216A71514244EFDB15DF58E8C4B27BFA1FB94328F20C569D9050B20AC336D846C7B1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386430741.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_122d000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 45ac567bc5b204fc132a3189988c660cf210697bbc1b71b3c892fc69c058da4a
                                            • Instruction ID: 2d455b5a3357c69ec25327e1b6245e6ea78c0a347965773282b39a264d4d5a6d
                                            • Opcode Fuzzy Hash: 45ac567bc5b204fc132a3189988c660cf210697bbc1b71b3c892fc69c058da4a
                                            • Instruction Fuzzy Hash: 04212571514248EFDB05CF98D5C0B1ABBA5FB84324F20CA6DD9494B247C376D846CA61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386430741.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_122d000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0e250dea505b48e137213bbb12592459a1ef814051a84fddbe00aa0cd8659eeb
                                            • Instruction ID: 67603ce21aaac8ea5e7a3a7da8c47c27da5980ac526245f86f68128059ae4c66
                                            • Opcode Fuzzy Hash: 0e250dea505b48e137213bbb12592459a1ef814051a84fddbe00aa0cd8659eeb
                                            • Instruction Fuzzy Hash: 11216771514248EFCB11CF58D4C0B1ABF61FB84354F20C96DD94A0B256C33AD907CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386430741.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_122d000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8e0465e189620865d534ff85b31835ed6beffad07ac7f87f2d57c63325b0a9ad
                                            • Instruction ID: 9d8fbee418874f8555b8f0953523c1ac6d1f17de6cdd3ac14517d4d8ee74cc72
                                            • Opcode Fuzzy Hash: 8e0465e189620865d534ff85b31835ed6beffad07ac7f87f2d57c63325b0a9ad
                                            • Instruction Fuzzy Hash: 4F217F755083849FCB02CF24D994B15BF71EB46314F28C5EAD9858F267C33A985ACB62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386264675.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_121d000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                            • Instruction ID: 487d30f196f66a50fef1032c8bd6e2631915478f7e32d562640c37098bf3b1e4
                                            • Opcode Fuzzy Hash: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                            • Instruction Fuzzy Hash: A1110376404284DFCB16CF14D5C4B16BFB1FB84324F24C6A9D9440B61AC336D45ACBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386430741.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_122d000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f825cc49a36603e58b05d30dbcded4ff69a659c0c942629433790640a090c2f4
                                            • Instruction ID: 53f369a2d4068362632f4add887f87b7c7ad76261e15585961d3c901c702ae70
                                            • Opcode Fuzzy Hash: f825cc49a36603e58b05d30dbcded4ff69a659c0c942629433790640a090c2f4
                                            • Instruction Fuzzy Hash: EB11BB75904284EFDB02CF54C5C0B19BBA1FB85324F28C6ADD9494B657C33AD44ACB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386264675.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_121d000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef355ff43589f21b0fb969b444c7f01a69cae61a773ee21a7dd1dee911753e98
                                            • Instruction ID: 457a76b1342cfb86a354cd20c4eea9b42d841ed09cdb206205ee5098ab1907c5
                                            • Opcode Fuzzy Hash: ef355ff43589f21b0fb969b444c7f01a69cae61a773ee21a7dd1dee911753e98
                                            • Instruction Fuzzy Hash: 8201FC315143C8DAE714CE59CC88B67BFD8DF51634F08851AEE051F24AD3B89842C6B1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000007.00000002.386264675.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_121d000_KgZEfacljaFey.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 75d34363ba8bbf02fb4ba71aab2876ac90dc87ce67ef52a433456f7a299006f1
                                            • Instruction ID: 5a950ba74b91b79ed53bf7dd90f60a88593785095f3f4314e8848c9373b5d0c7
                                            • Opcode Fuzzy Hash: 75d34363ba8bbf02fb4ba71aab2876ac90dc87ce67ef52a433456f7a299006f1
                                            • Instruction Fuzzy Hash: 9BF0C2714042889EE7158E59DC88B63FFD8EF91634F18C45AEE085F286C3B89845CAB1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:8.4%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:178
                                            Total number of Limit Nodes:7
                                            execution_graph 28491 4d9c4d8 28492 4d9c4e8 28491->28492 28496 4cbfe03 28492->28496 28500 4cbfe10 28492->28500 28493 4d9c4fa 28497 4cbfe10 28496->28497 28503 4cbda3c 28497->28503 28501 4cbda3c SetWindowLongW 28500->28501 28502 4cbfe28 28501->28502 28502->28493 28504 4cbfe40 SetWindowLongW 28503->28504 28505 4cbfe28 28504->28505 28505->28493 28647 4d9e3fb 28648 4d9e40e 28647->28648 28651 4d932d8 28648->28651 28650 4d9e431 28652 4d9e6e0 PostMessageW 28651->28652 28653 4d9e74c 28652->28653 28653->28650 28654 5e22c50 28655 5e22c59 28654->28655 28659 5e22ca0 28655->28659 28664 5e22c90 28655->28664 28656 5e22c8a 28660 5e22ca5 28659->28660 28669 5e22cd8 28660->28669 28674 5e22cc9 28660->28674 28661 5e22cbc 28661->28656 28665 5e22cac 28664->28665 28667 5e22cd8 DnsQuery_A 28665->28667 28668 5e22cc9 DnsQuery_A 28665->28668 28666 5e22cbc 28666->28656 28667->28666 28668->28666 28670 5e22cf6 28669->28670 28671 5e22d1e 28670->28671 28679 5e22de0 28670->28679 28683 5e22dd1 28670->28683 28671->28661 28676 5e22cd8 28674->28676 28675 5e22d1e 28675->28661 28676->28675 28677 5e22de0 DnsQuery_A 28676->28677 28678 5e22dd1 DnsQuery_A 28676->28678 28677->28676 28678->28676 28680 5e22e09 28679->28680 28687 5e21a1c 28680->28687 28684 5e22de0 28683->28684 28685 5e21a1c DnsQuery_A 28684->28685 28686 5e22e4a 28685->28686 28686->28670 28688 5e23058 DnsQuery_A 28687->28688 28690 5e23192 28688->28690 28571 4cb6758 28573 4cb6766 28571->28573 28574 4cb6344 28571->28574 28575 4cb634f 28574->28575 28578 4cb6394 28575->28578 28577 4cb688d 28577->28573 28579 4cb639f 28578->28579 28582 4cb63c4 28579->28582 28581 4cb6962 28581->28577 28583 4cb63cf 28582->28583 28586 4cb63f4 28583->28586 28585 4cb6a62 28585->28581 28588 4cb63ff 28586->28588 28587 4cb71bc 28587->28585 28588->28587 28591 4cbb408 28588->28591 28596 4cbb406 28588->28596 28592 4cbb429 28591->28592 28595 4cbb44d 28592->28595 28601 4cbb5b8 28592->28601 28605 4cbb5b3 28592->28605 28595->28587 28597 4cbb408 28596->28597 28598 4cbb44d 28597->28598 28599 4cbb5b8 5 API calls 28597->28599 28600 4cbb5b3 5 API calls 28597->28600 28598->28587 28599->28598 28600->28598 28602 4cbb5c5 28601->28602 28603 4cbb5ff 28602->28603 28609 4cba0ec 28602->28609 28603->28595 28606 4cbb5b8 28605->28606 28607 4cbb5ff 28606->28607 28608 4cba0ec 5 API calls 28606->28608 28607->28595 28608->28607 28610 4cba0f7 28609->28610 28612 4cbc2f8 28610->28612 28613 4cbb904 28610->28613 28612->28612 28614 4cbb90f 28613->28614 28615 4cbc367 28614->28615 28616 4cb63f4 5 API calls 28614->28616 28623 4cbc3db 28615->28623 28627 4cbc3e0 28615->28627 28616->28615 28617 4cbc375 28621 4cbe0eb LoadLibraryExW GetModuleHandleW CreateWindowExW 28617->28621 28622 4cbe0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW 28617->28622 28618 4cbc3a0 28618->28612 28621->28618 28622->28618 28624 4cbc40e 28623->28624 28625 4cbc4da KiUserCallbackDispatcher 28624->28625 28626 4cbc4df 28624->28626 28625->28626 28628 4cbc40e 28627->28628 28629 4cbc4da KiUserCallbackDispatcher 28628->28629 28630 4cbc4df 28628->28630 28629->28630 28506 4d9f050 28508 4d9f088 28506->28508 28510 4d9f0b4 28506->28510 28507 4d9f091 28508->28507 28511 4d9dc44 28508->28511 28512 4d9dc4f 28511->28512 28514 4d9f3ab 28512->28514 28515 4d9dc60 28512->28515 28514->28510 28516 4d9f3e0 OleInitialize 28515->28516 28517 4d9f444 28516->28517 28517->28514 28518 4d9c3d0 SendMessageW 28519 4d9c444 28518->28519 28520 5e20968 28521 5e20978 28520->28521 28522 5e209e5 28521->28522 28524 5e20eb0 28521->28524 28528 5e20ee0 28524->28528 28534 5e20ecf 28524->28534 28525 5e20ece 28525->28522 28529 5e20eed 28528->28529 28530 5e20ef1 28528->28530 28529->28525 28540 5e210f8 28530->28540 28545 5e210de 28530->28545 28535 5e20eed 28534->28535 28536 5e20ef1 28534->28536 28535->28525 28538 5e210f8 CreateWindowExW 28536->28538 28539 5e210de CreateWindowExW 28536->28539 28537 5e20f11 28537->28525 28538->28537 28539->28537 28541 5e21100 28540->28541 28550 4cbee00 28541->28550 28555 4cbedfb 28541->28555 28546 5e210ed 28545->28546 28548 4cbedfb CreateWindowExW 28546->28548 28549 4cbee00 CreateWindowExW 28546->28549 28547 5e20f11 28547->28525 28548->28547 28549->28547 28551 4cbee2a 28550->28551 28552 4cbeed1 28551->28552 28560 4cbfb98 28551->28560 28564 4cbfba8 28551->28564 28556 4cbee2a 28555->28556 28557 4cbeed1 28556->28557 28558 4cbfb98 CreateWindowExW 28556->28558 28559 4cbfba8 CreateWindowExW 28556->28559 28558->28557 28559->28557 28561 4cbfba8 28560->28561 28567 4cbda04 28561->28567 28565 4cbda04 CreateWindowExW 28564->28565 28566 4cbfbdd 28565->28566 28566->28552 28568 4cbfbf8 CreateWindowExW 28567->28568 28570 4cbfd1c 28568->28570 28631 4cbb6d0 28632 4cbb736 28631->28632 28636 4cbbc88 28632->28636 28639 4cbbc98 28632->28639 28633 4cbb7e5 28642 4cba14c 28636->28642 28640 4cbbcc6 28639->28640 28641 4cba14c DuplicateHandle 28639->28641 28640->28633 28641->28640 28643 4cbbd00 DuplicateHandle 28642->28643 28644 4cbbcc6 28643->28644 28644->28633 28691 4cb92f0 28692 4cb92ff 28691->28692 28695 4cb93db 28691->28695 28703 4cb93e8 28691->28703 28696 4cb93fb 28695->28696 28697 4cb9413 28696->28697 28711 4cb9663 28696->28711 28715 4cb9670 28696->28715 28697->28692 28698 4cb940b 28698->28697 28699 4cb9610 GetModuleHandleW 28698->28699 28700 4cb963d 28699->28700 28700->28692 28704 4cb93fb 28703->28704 28705 4cb9413 28704->28705 28709 4cb9663 LoadLibraryExW 28704->28709 28710 4cb9670 LoadLibraryExW 28704->28710 28705->28692 28706 4cb940b 28706->28705 28707 4cb9610 GetModuleHandleW 28706->28707 28708 4cb963d 28707->28708 28708->28692 28709->28706 28710->28706 28712 4cb9670 28711->28712 28714 4cb96a9 28712->28714 28719 4cb8768 28712->28719 28714->28698 28716 4cb9684 28715->28716 28717 4cb8768 LoadLibraryExW 28716->28717 28718 4cb96a9 28716->28718 28717->28718 28718->28698 28720 4cb9850 LoadLibraryExW 28719->28720 28722 4cb98c9 28720->28722 28722->28714

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 26 5e22fa0-5e22fbc 27 5e22fd2-5e23033 26->27 28 5e22fbe-5e22fcf 26->28 37 5e23010-5e2303f 27->37 38 5e23041-5e230cb 27->38 43 5e23104-5e23137 38->43 44 5e230cd-5e230d7 38->44 54 5e2313f-5e23190 DnsQuery_A 43->54 44->43 46 5e230d9-5e230db 44->46 48 5e230fe-5e23101 46->48 49 5e230dd-5e230e7 46->49 48->43 51 5e230eb-5e230fa 49->51 52 5e230e9 49->52 51->51 53 5e230fc 51->53 52->51 53->48 55 5e23192-5e23198 54->55 56 5e23199-5e231e6 54->56 55->56 61 5e231f6-5e231fa 56->61 62 5e231e8-5e231ec 56->62 64 5e23209-5e2320d 61->64 65 5e231fc-5e231ff 61->65 62->61 63 5e231ee 62->63 63->61 66 5e2321e 64->66 67 5e2320f-5e2321b 64->67 65->64 69 5e2321f 66->69 67->66 69->69
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567934290.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_5e20000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 568428a56625dc60de49505fe670b25437e529ffe88d99d15de17c0db9055a42
                                            • Instruction ID: 5ad262770b98800a0dbe4468cef485746ea24b46b44dd2564b49b311f47a852d
                                            • Opcode Fuzzy Hash: 568428a56625dc60de49505fe670b25437e529ffe88d99d15de17c0db9055a42
                                            • Instruction Fuzzy Hash: B3816871D043198FDF10DFA9C881ADEBBB1FF48304F10852AE855AB254DB79A946CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 70 4cb93e8-4cb93f0 71 4cb93fb-4cb93fd 70->71 72 4cb93f6 call 4cb8704 70->72 73 4cb93ff 71->73 74 4cb9413-4cb9417 71->74 72->71 125 4cb9405 call 4cb9663 73->125 126 4cb9405 call 4cb9670 73->126 75 4cb942b-4cb946c 74->75 76 4cb9419-4cb9423 74->76 81 4cb9479-4cb9487 75->81 82 4cb946e-4cb9476 75->82 76->75 77 4cb940b-4cb940d 77->74 78 4cb9548-4cb9608 77->78 118 4cb960a-4cb960d 78->118 119 4cb9610-4cb963b GetModuleHandleW 78->119 84 4cb94ab-4cb94ad 81->84 85 4cb9489-4cb948e 81->85 82->81 86 4cb94b0-4cb94b7 84->86 87 4cb9499 85->87 88 4cb9490-4cb9497 call 4cb8710 85->88 89 4cb94b9-4cb94c1 86->89 90 4cb94c4-4cb94cb 86->90 91 4cb949b-4cb94a9 87->91 88->91 89->90 94 4cb94d8-4cb94e1 call 4cb8720 90->94 95 4cb94cd-4cb94d5 90->95 91->86 101 4cb94ee-4cb94f3 94->101 102 4cb94e3-4cb94eb 94->102 95->94 103 4cb9511-4cb9515 101->103 104 4cb94f5-4cb94fc 101->104 102->101 123 4cb9518 call 4cb9968 103->123 124 4cb9518 call 4cb9966 103->124 104->103 106 4cb94fe-4cb950e call 4cb8730 call 4cb8740 104->106 106->103 107 4cb951b-4cb951e 109 4cb9541-4cb9547 107->109 110 4cb9520-4cb953e 107->110 110->109 118->119 120 4cb963d-4cb9643 119->120 121 4cb9644-4cb9658 119->121 120->121 123->107 124->107 125->77 126->77
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 04CB962E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 7b159b5f5648ef6867103ce1d44c57bca8ad014637be50dda7b223d0b6de6f17
                                            • Instruction ID: 1debfded7750be85715335705a6861d42d80f213e3b99c775555c749b85d4440
                                            • Opcode Fuzzy Hash: 7b159b5f5648ef6867103ce1d44c57bca8ad014637be50dda7b223d0b6de6f17
                                            • Instruction Fuzzy Hash: FD7113B0A00B058FD764DF2AC45079ABBF2BF88314F108A29E58AD7A50D774F9468F91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 155 5e2304c-5e230cb 159 5e23104-5e23137 155->159 160 5e230cd-5e230d7 155->160 168 5e2313f-5e23190 DnsQuery_A 159->168 160->159 161 5e230d9-5e230db 160->161 162 5e230fe-5e23101 161->162 163 5e230dd-5e230e7 161->163 162->159 165 5e230eb-5e230fa 163->165 166 5e230e9 163->166 165->165 167 5e230fc 165->167 166->165 167->162 169 5e23192-5e23198 168->169 170 5e23199-5e231e6 168->170 169->170 175 5e231f6-5e231fa 170->175 176 5e231e8-5e231ec 170->176 178 5e23209-5e2320d 175->178 179 5e231fc-5e231ff 175->179 176->175 177 5e231ee 176->177 177->175 180 5e2321e 178->180 181 5e2320f-5e2321b 178->181 179->178 183 5e2321f 180->183 181->180 183->183
                                            APIs
                                            • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 05E23180
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567934290.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_5e20000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: Query_
                                            • String ID:
                                            • API String ID: 428220571-0
                                            • Opcode ID: bfdf01b19b366920d0bec923f3aa70054d911fc3e52cd3d150996d9af4750ca1
                                            • Instruction ID: d67750c53ca86764cd9e872f1e073ff7d74f34ef1724047e364e5e759ae08248
                                            • Opcode Fuzzy Hash: bfdf01b19b366920d0bec923f3aa70054d911fc3e52cd3d150996d9af4750ca1
                                            • Instruction Fuzzy Hash: EB514671D003589FDB10CFA9C881ADEBBB1FF48304F14842AE855AB254DB796886CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 127 5e21a1c-5e230cb 130 5e23104-5e23190 DnsQuery_A 127->130 131 5e230cd-5e230d7 127->131 140 5e23192-5e23198 130->140 141 5e23199-5e231e6 130->141 131->130 132 5e230d9-5e230db 131->132 133 5e230fe-5e23101 132->133 134 5e230dd-5e230e7 132->134 133->130 136 5e230eb-5e230fa 134->136 137 5e230e9 134->137 136->136 138 5e230fc 136->138 137->136 138->133 140->141 146 5e231f6-5e231fa 141->146 147 5e231e8-5e231ec 141->147 149 5e23209-5e2320d 146->149 150 5e231fc-5e231ff 146->150 147->146 148 5e231ee 147->148 148->146 151 5e2321e 149->151 152 5e2320f-5e2321b 149->152 150->149 154 5e2321f 151->154 152->151 154->154
                                            APIs
                                            • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 05E23180
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567934290.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_5e20000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: Query_
                                            • String ID:
                                            • API String ID: 428220571-0
                                            • Opcode ID: 4e254e64b74c95ae20f8e1337d92a34fb277a718d2910074bb6fdcb732040333
                                            • Instruction ID: c48cf52f033abcd48981cb1c4d7e3c70106e9d29f52d78931782a4f3fa154dcc
                                            • Opcode Fuzzy Hash: 4e254e64b74c95ae20f8e1337d92a34fb277a718d2910074bb6fdcb732040333
                                            • Instruction Fuzzy Hash: C85145B1D0031C9FDB10CFA9C885ADEBBB1FF48304F24852AE855AB254DB786885CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 184 4cbfbec-4cbfc5e 185 4cbfc69-4cbfc70 184->185 186 4cbfc60-4cbfc66 184->186 187 4cbfc7b-4cbfcb3 185->187 188 4cbfc72-4cbfc78 185->188 186->185 189 4cbfcbb-4cbfd1a CreateWindowExW 187->189 188->187 190 4cbfd1c-4cbfd22 189->190 191 4cbfd23-4cbfd5b 189->191 190->191 195 4cbfd68 191->195 196 4cbfd5d-4cbfd60 191->196 197 4cbfd69 195->197 196->195 197->197
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04CBFD0A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 395e61ab29de29779ccc07727ce06754ce46be06a3cd5b092ec9ce5341973d80
                                            • Instruction ID: 1b6788ffd7f4f9bae7e2f144f7b910e243904a1d567b51cb24dcb41e74a9234e
                                            • Opcode Fuzzy Hash: 395e61ab29de29779ccc07727ce06754ce46be06a3cd5b092ec9ce5341973d80
                                            • Instruction Fuzzy Hash: 2351A2B1D102099FDB14CFA9D884ADEBBB5FF48314F24812AE815AB214D775A985CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 198 4cbda04-4cbfc5e 200 4cbfc69-4cbfc70 198->200 201 4cbfc60-4cbfc66 198->201 202 4cbfc7b-4cbfd1a CreateWindowExW 200->202 203 4cbfc72-4cbfc78 200->203 201->200 205 4cbfd1c-4cbfd22 202->205 206 4cbfd23-4cbfd5b 202->206 203->202 205->206 210 4cbfd68 206->210 211 4cbfd5d-4cbfd60 206->211 212 4cbfd69 210->212 211->210 212->212
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04CBFD0A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: faad8c799d398dd47abcffdd409ec6da3a10f367c995278f25424dcde6bc57df
                                            • Instruction ID: eef8a56fc2abcb2ff63fb25a029a7613ce1cf2201935d6c7210292d0ccc7199a
                                            • Opcode Fuzzy Hash: faad8c799d398dd47abcffdd409ec6da3a10f367c995278f25424dcde6bc57df
                                            • Instruction Fuzzy Hash: 0D51A2B1D10309DFDB14CFAAC884ADEBBB5BF48310F24812AE415AB214D775A945CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 213 4cba14c-4cbbd94 DuplicateHandle 215 4cbbd9d-4cbbdba 213->215 216 4cbbd96-4cbbd9c 213->216 216->215
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,04CBBCC6,?,?,?,?,?), ref: 04CBBD87
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 684e16630d1b8c3ab3350db6061dbb85a6ef02d1996ac15323b28bb5e0e21427
                                            • Instruction ID: 78817018626a7cc9abae547712d3013fbbac0a63bcaa8eceb54e1963ef0c48a6
                                            • Opcode Fuzzy Hash: 684e16630d1b8c3ab3350db6061dbb85a6ef02d1996ac15323b28bb5e0e21427
                                            • Instruction Fuzzy Hash: 5421E6B59002099FDB10CFAAD984ADEBFF5FB48310F14841AE954B7310D378A944DFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 219 4cbbcf9-4cbbd94 DuplicateHandle 220 4cbbd9d-4cbbdba 219->220 221 4cbbd96-4cbbd9c 219->221 221->220
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,04CBBCC6,?,?,?,?,?), ref: 04CBBD87
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 304ed7c4de2163d93bf36f80effcc6c6cd33087da22fb4b13dfaf49fa6ab05d8
                                            • Instruction ID: 0ae039a23fb237da6a3d5f3a2c32efefa6f3136ffbaef7fa7ecfb3e1244a342d
                                            • Opcode Fuzzy Hash: 304ed7c4de2163d93bf36f80effcc6c6cd33087da22fb4b13dfaf49fa6ab05d8
                                            • Instruction Fuzzy Hash: E821E2B5D00209DFDB00CFAAD584ADEBBF5FB48320F14841AE955A7310D378AA54DFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 224 4cb8768-4cb9890 226 4cb9898-4cb98c7 LoadLibraryExW 224->226 227 4cb9892-4cb9895 224->227 228 4cb98c9-4cb98cf 226->228 229 4cb98d0-4cb98ed 226->229 227->226 228->229
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,04CB96A9,00000800,00000000,00000000), ref: 04CB98BA
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: d6a4a99ea18ce0a3fcf8510c73f484ce0c22de2513e001cb46af29c0fcad29fa
                                            • Instruction ID: f961f6691299ad058fc0583d3a28d54c3db30f854ae9393779299ff26abdb186
                                            • Opcode Fuzzy Hash: d6a4a99ea18ce0a3fcf8510c73f484ce0c22de2513e001cb46af29c0fcad29fa
                                            • Instruction Fuzzy Hash: 641114B6D002099FDB10CF9AC444ADEFBF5EB88310F14842ED555B7600C375A945CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 239 4d932d8-4d9e74a PostMessageW 241 4d9e74c-4d9e752 239->241 242 4d9e753-4d9e774 239->242 241->242
                                            APIs
                                            • PostMessageW.USER32(?,025153E8,00000000,?), ref: 04D9E73D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567000847.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4d90000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 07ef436801a18e3dbcbb3e320aa564c7781e683d3bd971fac9fa52517bc88195
                                            • Instruction ID: dc6f07fb89c5c35916922fd25f0d0fd741bda03536c6841c321d69404472e88e
                                            • Opcode Fuzzy Hash: 07ef436801a18e3dbcbb3e320aa564c7781e683d3bd971fac9fa52517bc88195
                                            • Instruction Fuzzy Hash: E11128B59003099FDB10CF9AC885BEEBBF8FB48320F108429E554B7241D378A984DFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 232 4cb984b-4cb9890 233 4cb9898-4cb98c7 LoadLibraryExW 232->233 234 4cb9892-4cb9895 232->234 235 4cb98c9-4cb98cf 233->235 236 4cb98d0-4cb98ed 233->236 234->233 235->236
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,04CB96A9,00000800,00000000,00000000), ref: 04CB98BA
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 92d64630eabdac610c0e90fb663c3e3b2537fc90b746de2cdfeea4038f08481e
                                            • Instruction ID: 413d6a8477c9417eac190be16f06277dc52f16470963afe37957d44d9d368236
                                            • Opcode Fuzzy Hash: 92d64630eabdac610c0e90fb663c3e3b2537fc90b746de2cdfeea4038f08481e
                                            • Instruction Fuzzy Hash: 9C11F3B6D002098FDB10CFAAD484ADEFBF5AB88310F14842ED565B7610C379A645CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 244 4d9e6d8-4d9e74a PostMessageW 246 4d9e74c-4d9e752 244->246 247 4d9e753-4d9e774 244->247 246->247
                                            APIs
                                            • PostMessageW.USER32(?,025153E8,00000000,?), ref: 04D9E73D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567000847.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4d90000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 09247dcb58d1c6d586c986338423f2d5db2edca89f636792f8125dd69953f276
                                            • Instruction ID: 89c8c14da1d19c633b5711c06c339bef6c72b9f50bfe118bdbba708f3ec876eb
                                            • Opcode Fuzzy Hash: 09247dcb58d1c6d586c986338423f2d5db2edca89f636792f8125dd69953f276
                                            • Instruction Fuzzy Hash: BE1119B18002499FDB10CF99C984BEEBBF4FB48324F248559D454A7251C774A985CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 249 4d9d238-4d9d2aa SendMessageW 250 4d9d2ac-4d9d2b2 249->250 251 4d9d2b3-4d9d2c7 249->251 250->251
                                            APIs
                                            • SendMessageW.USER32(?,00000018,00000001,?), ref: 04D9D29D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567000847.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4d90000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 20d4666cc33c8c65d5ff47034cbcc56de0acea9a6fa7c1ab071693728dbc5e45
                                            • Instruction ID: 8637c6ee88e54b9e40a3755a529602ded6a995948bae8f76841aafb6585f26a0
                                            • Opcode Fuzzy Hash: 20d4666cc33c8c65d5ff47034cbcc56de0acea9a6fa7c1ab071693728dbc5e45
                                            • Instruction Fuzzy Hash: CB11F2B58002499FDB10CF9AD584BDEBFF4FB48320F20845AE455A7610C379A985CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SendMessageW.USER32(?,0000020A,?,?,?,?,?,?,04D9226A,?,00000000,?), ref: 04D9C435
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567000847.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4d90000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: ac76813a95628074fce1bd144032033d376e5c003079d5f2c51a01b7026c1c06
                                            • Instruction ID: f80b56f0d1d862de89d82024fed9231d207bba5ecc01fd4b95c9242ee08a2c6b
                                            • Opcode Fuzzy Hash: ac76813a95628074fce1bd144032033d376e5c003079d5f2c51a01b7026c1c06
                                            • Instruction Fuzzy Hash: 3511F2B59003499FDB10CF9AC984BEEBBF8EB48724F108419E555B7600D3B5A984CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SendMessageW.USER32(?,00000018,00000001,?), ref: 04D9D29D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567000847.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4d90000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 9acc0eee632a71d019bcde91a941aed540dfcc00e4ff4f5cd42464794a3d7f83
                                            • Instruction ID: b6fcb3de925a070c64fa159007356d5d0d5b4db964c4c24a4c78af0e015cb158
                                            • Opcode Fuzzy Hash: 9acc0eee632a71d019bcde91a941aed540dfcc00e4ff4f5cd42464794a3d7f83
                                            • Instruction Fuzzy Hash: 7E11F2B59002099FEB10CF9AC584BDEBBF8EB48320F10841AE955B7300C3B5A984CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 253 4cb95c8-4cb9608 254 4cb960a-4cb960d 253->254 255 4cb9610-4cb963b GetModuleHandleW 253->255 254->255 256 4cb963d-4cb9643 255->256 257 4cb9644-4cb9658 255->257 256->257
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 04CB962E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 2d22ee65a1df6946623734ae94071a43375b8f5145940de47b870671a815ebf3
                                            • Instruction ID: 2c29750e52c843eaf6853a609f526b5a6820a7a2f1ab2411adc3b7c26fe35360
                                            • Opcode Fuzzy Hash: 2d22ee65a1df6946623734ae94071a43375b8f5145940de47b870671a815ebf3
                                            • Instruction Fuzzy Hash: 701110B2C002098FDB10CF9AC444ADEFBF4AF88324F10842AD469B7600C379A545CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,04CBFE28,?,?,?,?), ref: 04CBFE9D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: LongWindow
                                            • String ID:
                                            • API String ID: 1378638983-0
                                            • Opcode ID: 49673d5cdaefad60ab38db7f5bb3cc0be0f784d6de994ddf731d64aaa31e3274
                                            • Instruction ID: 3ee10383d6534b77ca91d598da436b35fd2b106be21c35a2b0bcc1b5cfe42523
                                            • Opcode Fuzzy Hash: 49673d5cdaefad60ab38db7f5bb3cc0be0f784d6de994ddf731d64aaa31e3274
                                            • Instruction Fuzzy Hash: DD1103B59002499FDB10CF9AD984BEFBBF8EB88324F10845AE955B7341C374A944CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 04D9F435
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567000847.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4d90000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: 18f944eb01663eb3536519e2fea3d0ff0d16476a64df10735d6e5855b027cde3
                                            • Instruction ID: da9a70f88123e8c604dfc31cba02934f42d7adbd5c6d01b6907fb87e1b0df998
                                            • Opcode Fuzzy Hash: 18f944eb01663eb3536519e2fea3d0ff0d16476a64df10735d6e5855b027cde3
                                            • Instruction Fuzzy Hash: 271115B19002498FDB10CFAAD584BDEBBF4EB48324F108459D559F7700D378A944CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,04CBFE28,?,?,?,?), ref: 04CBFE9D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.566535792.0000000004CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4cb0000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: LongWindow
                                            • String ID:
                                            • API String ID: 1378638983-0
                                            • Opcode ID: 3d1f09d45cb4aa584299cca0aa334b104fff70c661ec5f717636f9c5d917265d
                                            • Instruction ID: 068f7e311ae95e0e61af23e2304b285279c3d71accc0e3124c2940caba057fd9
                                            • Opcode Fuzzy Hash: 3d1f09d45cb4aa584299cca0aa334b104fff70c661ec5f717636f9c5d917265d
                                            • Instruction Fuzzy Hash: BB1115B59002498FDB10CF9AD984BDEBBF4EB88320F20851AD855B7741C379A945CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 04D9F435
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567000847.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4d90000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: 587a577e721ee5ebd0985a0e85085507d1f9ecd1a1d3aa781b5c45894e955571
                                            • Instruction ID: 8d3315e49fc6fcfc834d198c4685ce768d4e5d704de0827558dff24e52e7f1bf
                                            • Opcode Fuzzy Hash: 587a577e721ee5ebd0985a0e85085507d1f9ecd1a1d3aa781b5c45894e955571
                                            • Instruction Fuzzy Hash: 7E1112B5900209CFDB10CFA9D5887CEBFF4AB48324F208429D559F7610D379A945CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SendMessageW.USER32(?,0000020A,?,?,?,?,?,?,04D9226A,?,00000000,?), ref: 04D9C435
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.567000847.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_4d90000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: f66c4f76e96f9ac8485192a5c1b31d97f1482647ee165cd3b79402ad3a1f4113
                                            • Instruction ID: 9a2a760dd65b565edded53e5616ad8f8eaa8f2873490cb36bb33a1fc2248da5d
                                            • Opcode Fuzzy Hash: f66c4f76e96f9ac8485192a5c1b31d97f1482647ee165cd3b79402ad3a1f4113
                                            • Instruction Fuzzy Hash: F41130B59003498FDB10CF99D584BDEBBF4FB48324F20881AD495A7200C374A994CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.561075587.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_a6d000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 01d7d7980893a8b1365a7533f28e17204e5efdc9f46358bbfa40bdbc59a24636
                                            • Instruction ID: a4969d90ea2e9a734afb8fb43f2550b2184d58b9f9a2af2724730b7e3ca8402e
                                            • Opcode Fuzzy Hash: 01d7d7980893a8b1365a7533f28e17204e5efdc9f46358bbfa40bdbc59a24636
                                            • Instruction Fuzzy Hash: 522167B1A04240DFDB11CF04D9C0B27BF71FB88368F208569E9060B606C336EC46DBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.561075587.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_a6d000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d58570459b07ac75c9cebb29eeeb800a9f9edfc1ce67908bcc0f1dee0aca0cb
                                            • Instruction ID: d9e2f6ea0955bc0d15dee88ce4cf41adf5576318b018ac9c54351a5870d65d6c
                                            • Opcode Fuzzy Hash: 6d58570459b07ac75c9cebb29eeeb800a9f9edfc1ce67908bcc0f1dee0aca0cb
                                            • Instruction Fuzzy Hash: C92125B1A04240EFDB05DF14D8C4B16BF75FB983A4F24C569E8050B246C736EC46D7A2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.561075587.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_a6d000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                            • Instruction ID: 1be804591e5e89936ab5bfa526de1d141717d133587dcd77c643a60fac959753
                                            • Opcode Fuzzy Hash: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                            • Instruction Fuzzy Hash: 5111E676904280CFCB16CF10D5C4B16BF71FB94324F24C6A9D8450B616C336E856CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.561075587.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_a6d000_cRC31pEDkr.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                            • Instruction ID: ab3a1fe336dac44fd8c21afccfd79b6a77c403bfdb3ed1198a9cdaa284c95f93
                                            • Opcode Fuzzy Hash: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                            • Instruction Fuzzy Hash: 4311D376904280CFDB16CF14D5C4B56BF71FB84324F24C6A9D9054B656C336D856CBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%