Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cRC31pEDkr.exe

Overview

General Information

Sample Name:cRC31pEDkr.exe
Analysis ID:800441
MD5:ac2609d2181f756550e3c180329b121c
SHA1:2ac2462013be76e3bb606c7deaec5e0e4609cd59
SHA256:9730aee1d4d04bb12e1df2a5550741eed7266625f8d99443dd0cd0dffca07112
Tags:exeNanoCore
Infos:

Detection

Nanocore, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected zgRAT
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cRC31pEDkr.exe (PID: 4064 cmdline: C:\Users\user\Desktop\cRC31pEDkr.exe MD5: AC2609D2181F756550E3C180329B121C)
    • powershell.exe (PID: 3492 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 4332 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 4724 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cRC31pEDkr.exe (PID: 4980 cmdline: C:\Users\user\Desktop\cRC31pEDkr.exe MD5: AC2609D2181F756550E3C180329B121C)
    • cRC31pEDkr.exe (PID: 4556 cmdline: C:\Users\user\Desktop\cRC31pEDkr.exe MD5: AC2609D2181F756550E3C180329B121C)
    • cRC31pEDkr.exe (PID: 1876 cmdline: C:\Users\user\Desktop\cRC31pEDkr.exe MD5: AC2609D2181F756550E3C180329B121C)
  • KgZEfacljaFey.exe (PID: 6040 cmdline: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe MD5: AC2609D2181F756550E3C180329B121C)
    • schtasks.exe (PID: 5600 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • KgZEfacljaFey.exe (PID: 5196 cmdline: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe MD5: AC2609D2181F756550E3C180329B121C)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "e971e6b5-1c8b-4bb4-a1a3-7f94e076", "Group": "Ebube", "Domain1": "elzy.ddns.net", "Domain2": "127.0.0.1", "Port": 2000, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x42f0d:$a: NanoCore
    • 0x42f66:$a: NanoCore
    • 0x42fa3:$a: NanoCore
    • 0x4301c:$a: NanoCore
    • 0x566c7:$a: NanoCore
    • 0x566dc:$a: NanoCore
    • 0x56711:$a: NanoCore
    • 0x6f183:$a: NanoCore
    • 0x6f198:$a: NanoCore
    • 0x6f1cd:$a: NanoCore
    • 0x42f6f:$b: ClientPlugin
    • 0x42fac:$b: ClientPlugin
    • 0x438aa:$b: ClientPlugin
    • 0x438b7:$b: ClientPlugin
    • 0x56483:$b: ClientPlugin
    • 0x5649e:$b: ClientPlugin
    • 0x564ce:$b: ClientPlugin
    • 0x566e5:$b: ClientPlugin
    • 0x5671a:$b: ClientPlugin
    • 0x6ef3f:$b: ClientPlugin
    • 0x6ef5a:$b: ClientPlugin
    0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x42fa3:$a1: NanoCore.ClientPluginHost
    • 0x56711:$a1: NanoCore.ClientPluginHost
    • 0x6f1cd:$a1: NanoCore.ClientPluginHost
    • 0x42f66:$a2: NanoCore.ClientPlugin
    • 0x566dc:$a2: NanoCore.ClientPlugin
    • 0x6f198:$a2: NanoCore.ClientPlugin
    • 0x4333a:$b1: get_BuilderSettings
    • 0x5b657:$b1: get_BuilderSettings
    • 0x74113:$b1: get_BuilderSettings
    • 0x42ff1:$b4: IClientAppHost
    • 0x433ab:$b6: AddHostEntry
    • 0x4341a:$b7: LogClientException
    • 0x5b5c6:$b7: LogClientException
    • 0x74082:$b7: LogClientException
    • 0x4338f:$b8: PipeExists
    • 0x42fde:$b9: IClientLoggingHost
    • 0x5672b:$b9: IClientLoggingHost
    • 0x6f1e7:$b9: IClientLoggingHost
    0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0x36139:$a1: NanoCore.ClientPluginHost
      • 0x360fc:$a2: NanoCore.ClientPlugin
      • 0x364d0:$b1: get_BuilderSettings
      • 0x36187:$b4: IClientAppHost
      • 0x36541:$b6: AddHostEntry
      • 0x365b0:$b7: LogClientException
      • 0x36525:$b8: PipeExists
      • 0x36174:$b9: IClientLoggingHost
      Click to see the 38 entries
      SourceRuleDescriptionAuthorStrings
      10.2.cRC31pEDkr.exe.5290000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      10.2.cRC31pEDkr.exe.5290000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      10.2.cRC31pEDkr.exe.5290000.3.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xe38:$x2: NanoCore.ClientPlugin
      • 0xe75:$x3: NanoCore.ClientPluginHost
      • 0xe5a:$i1: IClientApp
      • 0xe4e:$i2: IClientData
      • 0xe29:$i3: IClientNetwork
      • 0xec3:$i4: IClientAppHost
      • 0xe65:$i5: IClientDataHost
      • 0xeb0:$i6: IClientLoggingHost
      • 0xe8f:$i7: IClientNetworkHost
      • 0xea2:$i8: IClientUIHost
      • 0xed2:$i9: IClientNameObjectCollection
      • 0xef7:$i10: IClientReadOnlyNameObjectCollection
      • 0xe41:$s1: ClientPlugin
      • 0x177c:$s1: ClientPlugin
      • 0x1789:$s1: ClientPlugin
      • 0x11f9:$s6: get_ClientSettings
      • 0x1249:$s7: get_Connected
      10.2.cRC31pEDkr.exe.5290000.3.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xe75:$a1: NanoCore.ClientPluginHost
      • 0xe38:$a2: NanoCore.ClientPlugin
      • 0x120c:$b1: get_BuilderSettings
      • 0xec3:$b4: IClientAppHost
      • 0x127d:$b6: AddHostEntry
      • 0x12ec:$b7: LogClientException
      • 0x1261:$b8: PipeExists
      • 0xeb0:$b9: IClientLoggingHost
      14.2.KgZEfacljaFey.exe.3b8ff64.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      Click to see the 93 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\cRC31pEDkr.exe, ProcessId: 1876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\cRC31pEDkr.exe, ProcessId: 1876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Persistence and Installation Behavior

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\cRC31pEDkr.exe, ParentImage: C:\Users\user\Desktop\cRC31pEDkr.exe, ParentProcessId: 4064, ParentProcessName: cRC31pEDkr.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp, ProcessId: 4724, ProcessName: schtasks.exe

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\cRC31pEDkr.exe, ProcessId: 1876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\cRC31pEDkr.exe, ProcessId: 1876, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: cRC31pEDkr.exeReversingLabs: Detection: 66%
      Source: cRC31pEDkr.exeVirustotal: Detection: 58%Perma Link
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeReversingLabs: Detection: 66%
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTR
      Source: cRC31pEDkr.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJoe Sandbox ML: detected
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpackAvira: Label: TR/NanoCore.fadte
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "e971e6b5-1c8b-4bb4-a1a3-7f94e076", "Group": "Ebube", "Domain1": "elzy.ddns.net", "Domain2": "127.0.0.1", "Port": 2000, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Source: cRC31pEDkr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: cRC31pEDkr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Networking

      barindex
      Source: Malware configuration extractorURLs: elzy.ddns.net
      Source: Malware configuration extractorURLs: 127.0.0.1
      Source: unknownDNS query: name: elzy.ddns.net
      Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
      Source: global trafficTCP traffic: 192.168.2.5:49701 -> 194.5.98.22:2000
      Source: cRC31pEDkr.exe, 00000000.00000003.297044710.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296998530.00000000061B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
      Source: cRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296850779.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296828770.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296726022.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
      Source: cRC31pEDkr.exe, 00000000.00000003.296893411.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296871633.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296944042.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296850779.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296915043.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296828770.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296755309.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296778637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com(
      Source: cRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296778637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.comV
      Source: cRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: cRC31pEDkr.exe, 00000000.00000003.312291594.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312434363.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.:
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
      Source: cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com.
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com/
      Source: cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
      Source: cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCO
      Source: cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comUI
      Source: cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comX
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comgU
      Source: cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comiE
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.T
      Source: cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comorm
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304421291.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304556150.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304506350.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306063064.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061BB000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061C4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305483804.00000000061C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmld.
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersL
      Source: cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersn
      Source: cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersx
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com9
      Source: cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com=
      Source: cRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
      Source: cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312989584.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355271792.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF:
      Source: cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFB
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306063064.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comI.TTF
      Source: cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalicB
      Source: cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomFB
      Source: cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomd
      Source: cRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304556150.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
      Source: cRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdfet
      Source: cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355271792.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.come.com
      Source: cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312989584.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgreta
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307034097.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307202697.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307122475.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comk:
      Source: cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comonyo
      Source: cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsivdo
      Source: cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsivr
      Source: cRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtur
      Source: cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comuB
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
      Source: cRC31pEDkr.exe, 00000000.00000003.298437658.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298492392.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn%
      Source: cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298249561.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
      Source: cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/H
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/pa
      Source: cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnalg
      Source: cRC31pEDkr.exe, 00000000.00000003.298437658.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298492392.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnp
      Source: cRC31pEDkr.exe, 00000000.00000003.308327351.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308403894.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308132703.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308242645.00000000061B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: cRC31pEDkr.exe, 00000000.00000003.308132703.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/q
      Source: cRC31pEDkr.exe, 00000000.00000003.308242645.00000000061B1000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.309287347.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.309054521.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302344077.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/B
      Source: cRC31pEDkr.exe, 00000000.00000003.301234096.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/K
      Source: cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0;
      Source: cRC31pEDkr.exe, 00000000.00000003.301234096.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0MSB
      Source: cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
      Source: cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/B
      Source: cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/K
      Source: cRC31pEDkr.exe, 00000000.00000003.304174210.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304255888.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302711504.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302453010.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303976325.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303455893.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302393161.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302254936.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303356467.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304105124.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302841481.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302937899.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303747330.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302501034.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302640559.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303072404.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Y
      Source: cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/o
      Source: cRC31pEDkr.exe, 00000000.00000003.302453010.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302393161.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302254936.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302501034.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302344077.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s_tr
      Source: cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: cRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com.I
      Source: cRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comb-n
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
      Source: cRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298129567.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298291425.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298249561.00000000061B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: cRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krUN.TTFq
      Source: cRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298129567.00000000061AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krs-c
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299081793.000000000187C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
      Source: cRC31pEDkr.exe, 00000000.00000003.299081793.000000000187C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com(T
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
      Source: cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn%I
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnF
      Source: cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnai
      Source: unknownDNS traffic detected: queries for: elzy.ddns.net
      Source: cRC31pEDkr.exe, 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTR

      System Summary

      barindex
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.32981e4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.32731c8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 7.2.KgZEfacljaFey.exe.2c93208.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
      Source: 7.2.KgZEfacljaFey.exe.2cb8224.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: cRC31pEDkr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.5290000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.2ba966c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.371b12e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.32981e4.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.cRC31pEDkr.exe.27062c4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.32731c8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 7.2.KgZEfacljaFey.exe.2c93208.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
      Source: 7.2.KgZEfacljaFey.exe.2cb8224.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CC77C
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CE823
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CE830
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07BF0006
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07BF0040
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07ED0040
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07ED0006
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127C77C
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127E822
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127E830
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_052A4BE8
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_052A4BD8
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE480
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE473
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBBBD4
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D9F5F8
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D9A610
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D99788
      Source: cRC31pEDkr.exe, 00000000.00000003.336610706.000000000879D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamempfA.exe: vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 00000000.00000000.293953891.0000000000E62000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamempfA.exe: vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 00000000.00000002.357794140.0000000007A80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTigra.dll. vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.566234207.0000000003751000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.566234207.0000000003738000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.567804764.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exeBinary or memory string: OriginalFilenamempfA.exe: vs cRC31pEDkr.exe
      Source: cRC31pEDkr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: KgZEfacljaFey.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: cRC31pEDkr.exeReversingLabs: Detection: 66%
      Source: cRC31pEDkr.exeVirustotal: Detection: 58%
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile read: C:\Users\user\Desktop\cRC31pEDkr.exeJump to behavior
      Source: cRC31pEDkr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmp
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJump to behavior
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5E04.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@22/12@10/2
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: cRC31pEDkr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2056:120:WilError_01
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{e971e6b5-1c8b-4bb4-a1a3-7f94e07616a6}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4592:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4580:120:WilError_01
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeMutant created: \Sessions\1\BaseNamedObjects\RtIYcrDD
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4476:120:WilError_01
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: cRC31pEDkr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: cRC31pEDkr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: cRC31pEDkr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

      Data Obfuscation

      barindex
      Source: cRC31pEDkr.exe, Snake/Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: KgZEfacljaFey.exe.0.dr, Snake/Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.cRC31pEDkr.exe.e60000.0.unpack, Snake/Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CD838 pushad ; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_030CD83B push esp; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 0_2_07BF3602 push edi; retf
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127CF52 push 8402B5CBh; retf
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127D83A push esp; iretd
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_0127D838 pushad ; iretd
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeCode function: 7_2_052A624F push eax; mov dword ptr [esp], edx
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE0F0 push edx; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE471 push ebx; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE0D8 push ecx; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE0E3 push ecx; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE0E7 push ecx; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE349 push edx; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE36F push edx; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBE373 push edx; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBEDEF push edi; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBEDF3 push edi; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBEDF7 push edi; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBED89 push esi; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBEDB9 push esi; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB8A61 push ss; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB8A70 push ss; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB96C7 push ds; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB9660 push ds; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CBF798 pushad ; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB93D9 push ds; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB7A80 push cs; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04CB7A71 push cs; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D90027 push 683C04CFh; iretd
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeCode function: 10_2_04D969F8 pushad ; retf
      Source: cRC31pEDkr.exeStatic PE information: 0xF2C4F3B5 [Sun Jan 25 03:08:37 2099 UTC]
      Source: initial sampleStatic PE information: section name: .text entropy: 7.818047676595979
      Source: initial sampleStatic PE information: section name: .text entropy: 7.818047676595979
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeFile opened: C:\Users\user\Desktop\cRC31pEDkr.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.32981e4.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.32731c8.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.KgZEfacljaFey.exe.2c93208.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.KgZEfacljaFey.exe.2cb8224.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 6040, type: MEMORYSTR
      Source: cRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
      Source: cRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
      Source: C:\Users\user\Desktop\cRC31pEDkr.exe TID: 5236Thread sleep time: -37665s >= -30000s
      Source: C:\Users\user\Desktop\cRC31pEDkr.exe TID: 3924Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3584Thread sleep time: -11068046444225724s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2848Thread sleep time: -3689348814741908s >= -30000s
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe TID: 6064Thread sleep time: -37665s >= -30000s
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe TID: 1728Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\cRC31pEDkr.exe TID: 3124Thread sleep time: -13835058055282155s >= -30000s
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe TID: 860Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9305
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9086
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeWindow / User API: threadDelayed 9713
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeWindow / User API: foregroundWindowGot 853
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 37665
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 37665
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeThread delayed: delay time: 922337203685477
      Source: KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
      Source: cRC31pEDkr.exe, 0000000A.00000002.561292320.0000000000C80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
      Source: KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
      Source: KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeMemory written: C:\Users\user\Desktop\cRC31pEDkr.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeMemory written: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeProcess created: C:\Users\user\Desktop\cRC31pEDkr.exe C:\Users\user\Desktop\cRC31pEDkr.exe
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmp
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeProcess created: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.0000000002958000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@ %Gp@
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000029EE000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.0000000002A5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.0000000002A5E000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000029F0000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.0000000002B2A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Users\user\Desktop\cRC31pEDkr.exe VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Users\user\Desktop\cRC31pEDkr.exe VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\cRC31pEDkr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: cRC31pEDkr.exe, 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: cRC31pEDkr.exe, 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: cRC31pEDkr.exe, 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: cRC31pEDkr.exe, 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHost
      Source: KgZEfacljaFey.exe, 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: KgZEfacljaFey.exe, 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: KgZEfacljaFey.exe, 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: KgZEfacljaFey.exe, 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: KgZEfacljaFey.exe, 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a64629.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8b12e.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b9458d.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.3b8ff64.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.cRC31pEDkr.exe.5a60000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 14.2.KgZEfacljaFey.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.43d2800.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.436a5c0.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.cRC31pEDkr.exe.439fde0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 4064, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: cRC31pEDkr.exe PID: 1876, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: KgZEfacljaFey.exe PID: 5196, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      112
      Process Injection
      1
      Masquerading
      11
      Input Capture
      21
      Security Software Discovery
      Remote Services11
      Input Capture
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Scheduled Task/Job
      11
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      Exfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingData Transfer Size Limits21
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Hidden Files and Directories
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
      Obfuscated Files or Information
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
      Software Packing
      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
      Timestomp
      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 800441 Sample: cRC31pEDkr.exe Startdate: 07/02/2023 Architecture: WINDOWS Score: 100 50 Malicious sample detected (through community Yara rule) 2->50 52 Sigma detected: Scheduled temp file as task from temp location 2->52 54 Multi AV Scanner detection for submitted file 2->54 56 10 other signatures 2->56 7 cRC31pEDkr.exe 7 2->7         started        11 KgZEfacljaFey.exe 5 2->11         started        process3 file4 36 C:\Users\user\AppData\...\KgZEfacljaFey.exe, PE32 7->36 dropped 38 C:\...\KgZEfacljaFey.exe:Zone.Identifier, ASCII 7->38 dropped 40 C:\Users\user\AppData\Local\...\tmp5E04.tmp, XML 7->40 dropped 42 C:\Users\user\AppData\...\cRC31pEDkr.exe.log, ASCII 7->42 dropped 58 Uses schtasks.exe or at.exe to add and modify task schedules 7->58 60 Adds a directory exclusion to Windows Defender 7->60 62 Injects a PE file into a foreign processes 7->62 13 cRC31pEDkr.exe 6 7->13         started        18 powershell.exe 19 7->18         started        20 powershell.exe 21 7->20         started        26 3 other processes 7->26 64 Multi AV Scanner detection for dropped file 11->64 66 Machine Learning detection for dropped file 11->66 22 schtasks.exe 11->22         started        24 KgZEfacljaFey.exe 11->24         started        signatures5 process6 dnsIp7 46 elzy.ddns.net 194.5.98.22, 2000, 49701, 49702 DANILENKODE Netherlands 13->46 48 127.0.0.1 unknown unknown 13->48 44 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 13->44 dropped 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->68 28 conhost.exe 18->28         started        30 conhost.exe 20->30         started        32 conhost.exe 22->32         started        34 conhost.exe 26->34         started        file8 signatures9 process10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      cRC31pEDkr.exe67%ReversingLabsByteCode-MSIL.Trojan.RedLine
      cRC31pEDkr.exe58%VirustotalBrowse
      cRC31pEDkr.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe67%ReversingLabsByteCode-MSIL.Trojan.RedLine
      SourceDetectionScannerLabelLinkDownload
      10.2.cRC31pEDkr.exe.5a60000.5.unpack100%AviraTR/NanoCore.fadteDownload File
      14.2.KgZEfacljaFey.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      SourceDetectionScannerLabelLink
      elzy.ddns.net5%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.fontbureau.comgreta0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.fontbureau.com90%URL Reputationsafe
      http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.carterandcone.como.0%URL Reputationsafe
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.fontbureau.comcomd0%URL Reputationsafe
      http://www.carterandcone.comX0%URL Reputationsafe
      http://www.fontbureau.comk:0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/K0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/B0%URL Reputationsafe
      http://www.fontbureau.come.com0%URL Reputationsafe
      http://www.sandoll.co.krUN.TTFq0%Avira URL Cloudsafe
      http://en.w0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
      http://www.fontbureau.comals0%URL Reputationsafe
      http://www.zhongyicts.com.cnF0%URL Reputationsafe
      http://www.founder.com.cn/cn%0%URL Reputationsafe
      http://www.fontbureau.comI.TTF0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/B0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/K0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.carterandcone.com/0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.fontbureau.com=0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/pa0%Avira URL Cloudsafe
      http://www.carterandcone.comUI0%Avira URL Cloudsafe
      http://www.fontbureau.comdfet0%Avira URL Cloudsafe
      http://www.carterandcone.com0%URL Reputationsafe
      http://www.carterandcone.com.0%URL Reputationsafe
      http://www.sandoll.co.krs-c0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.founder.com.cn/cnp0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/s_tr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/Y0%URL Reputationsafe
      http://www.carterandcone.como.T0%Avira URL Cloudsafe
      http://www.fontbureau.comF0%URL Reputationsafe
      http://www.carterandcone.comTC0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/o0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.fontbureau.comd0%URL Reputationsafe
      http://www.founder.com.cn/cnalg0%Avira URL Cloudsafe
      http://www.fontbureau.comalicB0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.carterandcone.comorm0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y0;0%Avira URL Cloudsafe
      http://www.carterandcone.comiE0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/Y0MSB0%Avira URL Cloudsafe
      http://www.carterandcone.comgU0%Avira URL Cloudsafe
      http://www.tiro.com(T0%Avira URL Cloudsafe
      http://www.fontbureau.comsivdo0%Avira URL Cloudsafe
      http://www.agfamonotype.:0%Avira URL Cloudsafe
      http://fontfabrik.com(0%Avira URL Cloudsafe
      http://www.zhongyicts.com.cnai0%Avira URL Cloudsafe
      http://www.carterandcone.comTCO0%Avira URL Cloudsafe
      http://fontfabrik.comV0%Avira URL Cloudsafe
      http://www.fontbureau.comFB0%Avira URL Cloudsafe
      elzy.ddns.net0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/q0%Avira URL Cloudsafe
      http://www.fontbureau.comF:0%Avira URL Cloudsafe
      http://www.sajatypeworks.comb-n0%Avira URL Cloudsafe
      127.0.0.10%Avira URL Cloudsafe
      http://www.fontbureau.comonyo0%Avira URL Cloudsafe
      http://www.sajatypeworks.com.I0%Avira URL Cloudsafe
      http://www.fontbureau.comsivr0%Avira URL Cloudsafe
      http://www.fontbureau.comtur0%Avira URL Cloudsafe
      http://www.fontbureau.comcomFB0%Avira URL Cloudsafe
      http://www.zhongyicts.com.cn%I0%Avira URL Cloudsafe
      http://www.fontbureau.comuB0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/H0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      elzy.ddns.net
      194.5.98.22
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      elzy.ddns.nettrue
      • Avira URL Cloud: safe
      unknown
      127.0.0.1true
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.fontbureau.com/designers/frere-jones.htmld.cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061C4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305483804.00000000061C3000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://www.founder.com.cn/cn/pacRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designerscRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://www.sajatypeworks.comcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/cThecRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comk:cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307034097.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307202697.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.307122475.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.carterandcone.comUIcRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.comgretacRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312989584.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.sandoll.co.krUN.TTFqcRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.galapagosdesign.com/DPleasecRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com9cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmlcRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comdfetcRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.urwpp.deDPleasecRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.zhongyicts.com.cncRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecRC31pEDkr.exe, 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, KgZEfacljaFey.exe, 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.carterandcone.como.cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com=cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.galapagosdesign.com/cRC31pEDkr.exe, 00000000.00000003.308327351.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308403894.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308132703.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.308242645.00000000061B1000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.como.TcRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comcomdcRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comXcRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cnalgcRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/KcRC31pEDkr.exe, 00000000.00000003.301234096.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comalicBcRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/BcRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.come.comcRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355271792.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://en.wcRC31pEDkr.exe, 00000000.00000003.297044710.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296998530.00000000061B7000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comiEcRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/Y0;cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.carterandcone.comlcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298249561.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/frere-jones.htmlcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/Y0MSBcRC31pEDkr.exe, 00000000.00000003.301234096.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/tcRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.carterandcone.comgUcRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.com(TcRC31pEDkr.exe, 00000000.00000003.299081793.000000000187C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.fontbureau.comsivdocRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.agfamonotype.:cRC31pEDkr.exe, 00000000.00000003.312291594.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312434363.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comalscRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://fontfabrik.com(cRC31pEDkr.exe, 00000000.00000003.296893411.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296871633.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296944042.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296850779.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296915043.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296828770.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296755309.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296778637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.zhongyicts.com.cnFcRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnaicRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.founder.com.cn/cn%cRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersGcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comI.TTFcRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306063064.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://fontfabrik.comVcRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296778637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/jp/BcRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/?cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersLcRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bThecRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/jp/KcRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comTCOcRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299081793.000000000187C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.com/cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comFBcRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.goodfont.co.krcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comcRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.com.cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sandoll.co.krs-ccRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298129567.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmcRC31pEDkr.exe, 00000000.00000003.308242645.00000000061B1000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.309287347.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.309054521.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comcRC31pEDkr.exe, 00000000.00000003.296795116.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296850779.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296828770.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.296726022.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnpcRC31pEDkr.exe, 00000000.00000003.298437658.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298492392.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/qcRC31pEDkr.exe, 00000000.00000003.308132703.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comF:cRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.312989584.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313567844.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355271792.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designersxcRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/s_trcRC31pEDkr.exe, 00000000.00000003.302453010.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302393161.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302254936.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302501034.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302344077.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comb-ncRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fonts.comcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krcRC31pEDkr.exe, 00000000.00000003.298180772.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298129567.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298291425.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298215222.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298249561.00000000061B1000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.comcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersncRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/jp/YcRC31pEDkr.exe, 00000000.00000003.304174210.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304255888.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302711504.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302453010.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303976325.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303455893.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302393161.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302254936.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303356467.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304105124.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302841481.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301490267.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302937899.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303747330.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302501034.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302640559.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.303072404.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comonyocRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061AB000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comcRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304421291.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304353505.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304556150.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304506350.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306063064.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comFcRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306012535.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305962193.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305830017.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305783137.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305910322.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306141858.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comTCcRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comsivrcRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.sajatypeworks.com.IcRC31pEDkr.exe, 00000000.00000003.295924683.0000000006192000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/ocRC31pEDkr.exe, 00000000.00000003.301785059.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301578884.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302112307.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301845055.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comcomFBcRC31pEDkr.exe, 00000000.00000003.306651559.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306765652.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306221985.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306335557.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306899940.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306566595.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.306708081.00000000061B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.comturcRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cn/HcRC31pEDkr.exe, 00000000.00000003.298728068.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299661403.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299622371.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299398041.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300300850.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298967599.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298859286.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299487627.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299442136.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299115455.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299194871.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300062616.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299700076.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299806283.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299958934.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.299896606.00000000061B9000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298929001.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comdcRC31pEDkr.exe, 00000000.00000003.304814982.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305285674.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305615259.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305740219.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305000246.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304556150.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305570163.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305229705.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304597500.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304911562.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305173293.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305068245.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304695105.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304762717.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305432351.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305703104.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.305526668.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304864258.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cn%IcRC31pEDkr.exe, 00000000.00000003.299274112.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.fontbureau.com/designers/cabarga.htmlNcRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cncRC31pEDkr.exe, 00000000.00000003.298437658.00000000061B8000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298515941.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298663743.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.298492392.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comuBcRC31pEDkr.exe, 00000000.00000003.313368578.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313245718.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313086465.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.313446406.00000000061AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.carterandcone.comormcRC31pEDkr.exe, 00000000.00000003.300199248.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.300143320.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/cRC31pEDkr.exe, 00000000.00000003.301430204.00000000061AF000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301752812.00000000061B4000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301721227.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.301955327.00000000061B3000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302344077.00000000061B2000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.302191536.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8cRC31pEDkr.exe, 00000000.00000002.355816289.00000000073A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061BB000.00000004.00000020.00020000.00000000.sdmp, cRC31pEDkr.exe, 00000000.00000003.304305637.00000000061B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      194.5.98.22
                                      elzy.ddns.netNetherlands
                                      208476DANILENKODEtrue
                                      IP
                                      127.0.0.1
                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                      Analysis ID:800441
                                      Start date and time:2023-02-07 13:58:11 +01:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 9m 13s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:18
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample file name:cRC31pEDkr.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@22/12@10/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 94%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, WmiPrvSE.exe
                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      13:59:13API Interceptor784x Sleep call for process: cRC31pEDkr.exe modified
                                      13:59:17Task SchedulerRun new task: KgZEfacljaFey path: C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                      13:59:18API Interceptor55x Sleep call for process: powershell.exe modified
                                      13:59:32API Interceptor1x Sleep call for process: KgZEfacljaFey.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                      Malicious:true
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):21864
                                      Entropy (8bit):5.598059944466488
                                      Encrypted:false
                                      SSDEEP:384:+tCRLq0+3R2EYf3YSVxnejulrItCiJ9g9SJ3uyV1lm0ZSAVrdt8hqA+iRYg:bDgUxeClrSy9cuG3Uqg
                                      MD5:F0E335C7015467AA88CB725D1E79D3E3
                                      SHA1:2CB9B862933DC5AF60596D12EDB1F676C4AD9B6F
                                      SHA-256:C02AE364FCD84F5B4E478CB668B7F578C55E678AF9EE4C30254FB90B30BD0422
                                      SHA-512:8CE3A87486B215ABCDB564EBC8489E1D88065F7936D5234E6BCC201A1D34C4845D618CBC04F95F40700170A806881486B2E45E2F161188B9FD19831C24F8EB22
                                      Malicious:false
                                      Preview:@...e...............................:.X..............@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      File Type:XML 1.0 document, ASCII text
                                      Category:dropped
                                      Size (bytes):1604
                                      Entropy (8bit):5.134330559128222
                                      Encrypted:false
                                      SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxvn:cgeCaYrFdOFzOzN33ODOiDdKrsuTuv
                                      MD5:B60F588C1155AF27B4F7C47D9BA68B63
                                      SHA1:060A5DB198839D2D4D33E2DA93540D3BD1851042
                                      SHA-256:4467302D8DE2891402E2EC25B9824333F433D46A306D120E32D93BE4F216C492
                                      SHA-512:89527F28ED63991D6B1C0D18FDA21F9CF77E0CAB8EEA228359B9781C57FCE2D5EDACDBE5F26C5EB39DEE9C9B0384BD9C89628991D6A5C53B4C87B426410FD537
                                      Malicious:true
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                      Process:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                      File Type:XML 1.0 document, ASCII text
                                      Category:dropped
                                      Size (bytes):1604
                                      Entropy (8bit):5.134330559128222
                                      Encrypted:false
                                      SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxvn:cgeCaYrFdOFzOzN33ODOiDdKrsuTuv
                                      MD5:B60F588C1155AF27B4F7C47D9BA68B63
                                      SHA1:060A5DB198839D2D4D33E2DA93540D3BD1851042
                                      SHA-256:4467302D8DE2891402E2EC25B9824333F433D46A306D120E32D93BE4F216C492
                                      SHA-512:89527F28ED63991D6B1C0D18FDA21F9CF77E0CAB8EEA228359B9781C57FCE2D5EDACDBE5F26C5EB39DEE9C9B0384BD9C89628991D6A5C53B4C87B426410FD537
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                      Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      File Type:Non-ISO extended-ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):8
                                      Entropy (8bit):3.0
                                      Encrypted:false
                                      SSDEEP:3:CS:P
                                      MD5:76420758AE4C29CAAD2AA6B116E41716
                                      SHA1:59893B920B4F94B033959DA9C02E6156E8DD98DF
                                      SHA-256:136D683384EA664828711F6043304C6D2A1E89C3F8DAD346F6007FF13DD5F45D
                                      SHA-512:892DCB7634396D212CFA50CCA7610683BC01B83743131BE2F700912617F563498EBE2F0450DD59CF46448A298DB2A37C68394DEFF8A00D5480CD68F6A509FB64
                                      Malicious:true
                                      Preview:of.V..H
                                      Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):705536
                                      Entropy (8bit):7.810105998338931
                                      Encrypted:false
                                      SSDEEP:12288:VVC66Bm2iNNHOp7HPfubIVc1E0cE3UyV5sXoDCnJ8OSTaHlUI1FuH66B:GVM1rut21E0cEkI24D6PSuHlvuHV
                                      MD5:AC2609D2181F756550E3C180329B121C
                                      SHA1:2AC2462013BE76E3BB606C7DEAEC5E0E4609CD59
                                      SHA-256:9730AEE1D4D04BB12E1DF2A5550741EED7266625F8D99443DD0CD0DFFCA07112
                                      SHA-512:EE9DC08DD3E713FFE4A7FB658A37E8C689A5CDAC7E1CFA6FB3A26A048663FF70B524C49FCEF3B0C033D4DD2EFBE290E2DC62BE74145C461D1E711356C826CDA2
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 67%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........f...w...........................................................0............}......}.....(.......(........}.......s....}..... .... ....s....}......{......s....}.....{....r...po......(.....{....o......{......o......{....o..........s....s....}.....(......(.....{....o.....*....0.............{.....X}.....{.....].....,-..{....(....o......{....o....(....o.....8......{....( ...o......{....o....( ...o.......(......{....,..{.......+....,..(.....{......s....o........{....o!..
                                      Process:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.810105998338931
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:cRC31pEDkr.exe
                                      File size:705536
                                      MD5:ac2609d2181f756550e3c180329b121c
                                      SHA1:2ac2462013be76e3bb606c7deaec5e0e4609cd59
                                      SHA256:9730aee1d4d04bb12e1df2a5550741eed7266625f8d99443dd0cd0dffca07112
                                      SHA512:ee9dc08dd3e713ffe4a7fb658a37e8c689a5cdac7e1cfa6fb3a26a048663ff70b524c49fcef3b0c033d4dd2efbe290e2dc62be74145c461d1e711356c826cda2
                                      SSDEEP:12288:VVC66Bm2iNNHOp7HPfubIVc1E0cE3UyV5sXoDCnJ8OSTaHlUI1FuH66B:GVM1rut21E0cEkI24D6PSuHlvuHV
                                      TLSH:39E401811D64CA58E2F90EBD0F7C5A2D8FF45C9923E3E2B40BE6B4D9A463783C815536
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................... ............@................................
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x4ad902
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0xF2C4F3B5 [Sun Jan 25 03:08:37 2099 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xad8b00x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x5bc.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xad8940x1c.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xab9080xaba00False0.8738022350691915data7.818047676595979IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0xae0000x5bc0x600False0.4283854166666667data4.10376699366461IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xb00000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0xae0900x32cdata
                                      RT_MANIFEST0xae3cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSource PortDest PortSource IPDest IP
                                      Feb 7, 2023 13:59:31.713982105 CET497012000192.168.2.5194.5.98.22
                                      Feb 7, 2023 13:59:31.757090092 CET200049701194.5.98.22192.168.2.5
                                      Feb 7, 2023 13:59:32.392255068 CET497012000192.168.2.5194.5.98.22
                                      Feb 7, 2023 13:59:32.435534000 CET200049701194.5.98.22192.168.2.5
                                      Feb 7, 2023 13:59:33.001553059 CET497012000192.168.2.5194.5.98.22
                                      Feb 7, 2023 13:59:33.044615030 CET200049701194.5.98.22192.168.2.5
                                      Feb 7, 2023 13:59:37.180790901 CET497022000192.168.2.5194.5.98.22
                                      Feb 7, 2023 13:59:37.223854065 CET200049702194.5.98.22192.168.2.5
                                      Feb 7, 2023 13:59:37.845783949 CET497022000192.168.2.5194.5.98.22
                                      Feb 7, 2023 13:59:37.888947010 CET200049702194.5.98.22192.168.2.5
                                      Feb 7, 2023 13:59:38.549042940 CET497022000192.168.2.5194.5.98.22
                                      Feb 7, 2023 13:59:38.592144012 CET200049702194.5.98.22192.168.2.5
                                      Feb 7, 2023 13:59:42.792201996 CET497032000192.168.2.5194.5.98.22
                                      Feb 7, 2023 13:59:42.835329056 CET200049703194.5.98.22192.168.2.5
                                      Feb 7, 2023 13:59:43.346213102 CET497032000192.168.2.5194.5.98.22
                                      Feb 7, 2023 13:59:43.389285088 CET200049703194.5.98.22192.168.2.5
                                      Feb 7, 2023 13:59:44.049402952 CET497032000192.168.2.5194.5.98.22
                                      Feb 7, 2023 13:59:44.092649937 CET200049703194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:04.116805077 CET497102000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:04.159924030 CET200049710194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:04.660533905 CET497102000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:04.703702927 CET200049710194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:05.207479000 CET497102000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:05.250614882 CET200049710194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:09.301789045 CET497122000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:09.344774961 CET200049712194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:09.848398924 CET497122000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:09.891593933 CET200049712194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:10.395400047 CET497122000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:10.438546896 CET200049712194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:14.486471891 CET497132000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:14.530375004 CET200049713194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:15.036335945 CET497132000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:15.081300020 CET200049713194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:15.583241940 CET497132000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:15.626451015 CET200049713194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:35.702507973 CET497182000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:35.745628119 CET200049718194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:36.256872892 CET497182000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:36.300020933 CET200049718194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:36.803818941 CET497182000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:36.846869946 CET200049718194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:41.506460905 CET497192000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:41.549746990 CET200049719194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:42.054270983 CET497192000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:42.097364902 CET200049719194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:42.663737059 CET497192000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:42.708404064 CET200049719194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:46.919289112 CET497212000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:46.962531090 CET200049721194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:47.476569891 CET497212000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:47.519581079 CET200049721194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:00:48.023495913 CET497212000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:00:48.066632986 CET200049721194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:01:07.652275085 CET497262000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:01:07.695615053 CET200049726194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:01:08.207467079 CET497262000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:01:08.250525951 CET200049726194.5.98.22192.168.2.5
                                      Feb 7, 2023 14:01:08.762331963 CET497262000192.168.2.5194.5.98.22
                                      Feb 7, 2023 14:01:08.805807114 CET200049726194.5.98.22192.168.2.5
                                      TimestampSource PortDest PortSource IPDest IP
                                      Feb 7, 2023 13:59:31.679389000 CET6189353192.168.2.58.8.8.8
                                      Feb 7, 2023 13:59:31.699139118 CET53618938.8.8.8192.168.2.5
                                      Feb 7, 2023 13:59:37.159048080 CET6064953192.168.2.58.8.8.8
                                      Feb 7, 2023 13:59:37.179442883 CET53606498.8.8.8192.168.2.5
                                      Feb 7, 2023 13:59:42.715939045 CET5144153192.168.2.58.8.8.8
                                      Feb 7, 2023 13:59:42.735929966 CET53514418.8.8.8192.168.2.5
                                      Feb 7, 2023 14:00:04.092628002 CET6532353192.168.2.58.8.8.8
                                      Feb 7, 2023 14:00:04.113540888 CET53653238.8.8.8192.168.2.5
                                      Feb 7, 2023 14:00:09.282095909 CET6344653192.168.2.58.8.8.8
                                      Feb 7, 2023 14:00:09.300489902 CET53634468.8.8.8192.168.2.5
                                      Feb 7, 2023 14:00:14.467171907 CET5675153192.168.2.58.8.8.8
                                      Feb 7, 2023 14:00:14.485213041 CET53567518.8.8.8192.168.2.5
                                      Feb 7, 2023 14:00:35.679114103 CET6097553192.168.2.58.8.8.8
                                      Feb 7, 2023 14:00:35.700711012 CET53609758.8.8.8192.168.2.5
                                      Feb 7, 2023 14:00:41.407455921 CET5922053192.168.2.58.8.8.8
                                      Feb 7, 2023 14:00:41.429548979 CET53592208.8.8.8192.168.2.5
                                      Feb 7, 2023 14:00:46.845959902 CET5668253192.168.2.58.8.8.8
                                      Feb 7, 2023 14:00:46.865693092 CET53566828.8.8.8192.168.2.5
                                      Feb 7, 2023 14:01:07.633317947 CET6265953192.168.2.58.8.8.8
                                      Feb 7, 2023 14:01:07.651314974 CET53626598.8.8.8192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Feb 7, 2023 13:59:31.679389000 CET192.168.2.58.8.8.80xb8e1Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      Feb 7, 2023 13:59:37.159048080 CET192.168.2.58.8.8.80xc0cdStandard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      Feb 7, 2023 13:59:42.715939045 CET192.168.2.58.8.8.80xc75eStandard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:04.092628002 CET192.168.2.58.8.8.80x1f49Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:09.282095909 CET192.168.2.58.8.8.80x26dbStandard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:14.467171907 CET192.168.2.58.8.8.80x8558Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:35.679114103 CET192.168.2.58.8.8.80xdfdcStandard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:41.407455921 CET192.168.2.58.8.8.80x1d80Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:46.845959902 CET192.168.2.58.8.8.80x7a18Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:01:07.633317947 CET192.168.2.58.8.8.80xd446Standard query (0)elzy.ddns.netA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Feb 7, 2023 13:59:31.699139118 CET8.8.8.8192.168.2.50xb8e1No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                      Feb 7, 2023 13:59:37.179442883 CET8.8.8.8192.168.2.50xc0cdNo error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                      Feb 7, 2023 13:59:42.735929966 CET8.8.8.8192.168.2.50xc75eNo error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:04.113540888 CET8.8.8.8192.168.2.50x1f49No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:09.300489902 CET8.8.8.8192.168.2.50x26dbNo error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:14.485213041 CET8.8.8.8192.168.2.50x8558No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:35.700711012 CET8.8.8.8192.168.2.50xdfdcNo error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:41.429548979 CET8.8.8.8192.168.2.50x1d80No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:00:46.865693092 CET8.8.8.8192.168.2.50x7a18No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false
                                      Feb 7, 2023 14:01:07.651314974 CET8.8.8.8192.168.2.50xd446No error (0)elzy.ddns.net194.5.98.22A (IP address)IN (0x0001)false

                                      Click to jump to process

                                      Target ID:0
                                      Start time:13:59:04
                                      Start date:07/02/2023
                                      Path:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      Imagebase:0xe60000
                                      File size:705536 bytes
                                      MD5 hash:AC2609D2181F756550E3C180329B121C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.350028595.000000000436A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.345847320.0000000003251000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.345847320.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:1
                                      Start time:13:59:15
                                      Start date:07/02/2023
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\cRC31pEDkr.exe
                                      Imagebase:0xe80000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Target ID:2
                                      Start time:13:59:15
                                      Start date:07/02/2023
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7fcd70000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:3
                                      Start time:13:59:15
                                      Start date:07/02/2023
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                      Imagebase:0xe80000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Target ID:4
                                      Start time:13:59:15
                                      Start date:07/02/2023
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7fcd70000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:5
                                      Start time:13:59:15
                                      Start date:07/02/2023
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmp5E04.tmp
                                      Imagebase:0x820000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:6
                                      Start time:13:59:15
                                      Start date:07/02/2023
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7fcd70000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:7
                                      Start time:13:59:17
                                      Start date:07/02/2023
                                      Path:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                      Imagebase:0x7ff7fcd70000
                                      File size:705536 bytes
                                      MD5 hash:AC2609D2181F756550E3C180329B121C
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000007.00000002.388126518.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000007.00000002.388126518.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 67%, ReversingLabs
                                      Reputation:low

                                      Target ID:8
                                      Start time:13:59:24
                                      Start date:07/02/2023
                                      Path:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      Imagebase:0x1a0000
                                      File size:705536 bytes
                                      MD5 hash:AC2609D2181F756550E3C180329B121C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low

                                      Target ID:9
                                      Start time:13:59:24
                                      Start date:07/02/2023
                                      Path:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      Imagebase:0x2b0000
                                      File size:705536 bytes
                                      MD5 hash:AC2609D2181F756550E3C180329B121C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low

                                      Target ID:10
                                      Start time:13:59:24
                                      Start date:07/02/2023
                                      Path:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\cRC31pEDkr.exe
                                      Imagebase:0x450000
                                      File size:705536 bytes
                                      MD5 hash:AC2609D2181F756550E3C180329B121C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.562803290.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.567364411.0000000005290000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.566234207.000000000371B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.567497022.0000000005A60000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      Target ID:12
                                      Start time:13:59:36
                                      Start date:07/02/2023
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KgZEfacljaFey" /XML "C:\Users\user\AppData\Local\Temp\tmpAD4D.tmp
                                      Imagebase:0x820000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:13
                                      Start time:13:59:36
                                      Start date:07/02/2023
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7fcd70000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:14
                                      Start time:13:59:43
                                      Start date:07/02/2023
                                      Path:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\KgZEfacljaFey.exe
                                      Imagebase:0x750000
                                      File size:705536 bytes
                                      MD5 hash:AC2609D2181F756550E3C180329B121C
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.404051124.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.401166525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.403629575.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                      No disassembly