Loading ...

Play interactive tourEdit tour

Analysis Report y3t4g48gj6_PAYMENT.exe

Overview

General Information

Sample Name:y3t4g48gj6_PAYMENT.exe
Analysis ID:411524
MD5:9998f7e0c708ba1fa4b56235a9811c0f
SHA1:e3810d21600bb0113b2d7116347326beb6a35d83
SHA256:9f44f33f1b0b724292959b65ae6f2918cb1993641ad7832ffdbd68fc00fdda2c
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Creates an autostart registry key pointing to binary in C:\Windows
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Non Interactive PowerShell
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • y3t4g48gj6_PAYMENT.exe (PID: 6928 cmdline: 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' MD5: 9998F7E0C708BA1FA4B56235A9811C0F)
    • powershell.exe (PID: 1376 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 6328 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 6824 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 7080 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 7052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 808 cmdline: timeout 1 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
    • y3t4g48gj6_PAYMENT.exe (PID: 6280 cmdline: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe MD5: 9998F7E0C708BA1FA4B56235A9811C0F)
    • WerFault.exe (PID: 6568 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 6252 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1576 cmdline: 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' MD5: 9998F7E0C708BA1FA4B56235A9811C0F)
  • svchost.exe (PID: 6336 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4296 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 1368 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 6476 cmdline: 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' MD5: 9998F7E0C708BA1FA4B56235A9811C0F)
  • svchost.exe (PID: 6252 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5148 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f8dffc54-5ec5-4013-9de8-d8d85368", "Group": "CODEDBASE", "Domain1": "omaprilcode.duckdns.org", "Domain2": "omaprilcode.duckdns.org", "Port": 8090, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x3bf37d:$x1: NanoCore.ClientPluginHost
  • 0x3bf3ba:$x2: IClientNetworkHost
  • 0x3c2eed:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x3bf0e5:$a: NanoCore
    • 0x3bf0f5:$a: NanoCore
    • 0x3bf329:$a: NanoCore
    • 0x3bf33d:$a: NanoCore
    • 0x3bf37d:$a: NanoCore
    • 0x3bf144:$b: ClientPlugin
    • 0x3bf346:$b: ClientPlugin
    • 0x3bf386:$b: ClientPlugin
    • 0x3bf26b:$c: ProjectData
    • 0x3bfc72:$d: DESCrypto
    • 0x3c763e:$e: KeepAlive
    • 0x3c562c:$g: LogClientMessage
    • 0x3c1827:$i: get_Connected
    • 0x3bffa8:$j: #=q
    • 0x3bffd8:$j: #=q
    • 0x3bfff4:$j: #=q
    • 0x3c0024:$j: #=q
    • 0x3c0040:$j: #=q
    • 0x3c005c:$j: #=q
    • 0x3c008c:$j: #=q
    • 0x3c00a8:$j: #=q
    Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928Nanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x37b755:$x1: NanoCore.ClientPluginHost
    • 0x37b7b6:$x2: IClientNetworkHost
    • 0x380bbb:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x38eb2d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928JoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 1 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe38d:$x1: NanoCore.ClientPluginHost
        • 0xe3ca:$x2: IClientNetworkHost
        • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        Click to see the 3 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ProcessId: 6280, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ProcessId: 6280, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary:

        barindex
        Sigma detected: Non Interactive PowerShellShow sources
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force, CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' , ParentImage: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ParentProcessId: 6928, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force, ProcessId: 1376

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ProcessId: 6280, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ProcessId: 6280, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f8dffc54-5ec5-4013-9de8-d8d85368", "Group": "CODEDBASE", "Domain1": "omaprilcode.duckdns.org", "Domain2": "omaprilcode.duckdns.org", "Port": 8090, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeReversingLabs: Detection: 14%
        Multi AV Scanner detection for submitted fileShow sources
        Source: y3t4g48gj6_PAYMENT.exeReversingLabs: Detection: 14%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORY
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: y3t4g48gj6_PAYMENT.exeJoe Sandbox ML: detected
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: iertutil.pdbw| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: onfiguration.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: ml.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: .ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: clr.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: ility.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: advapi32.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Dynamic.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wuser32.pdbi source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: urlmon.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.CSharp.pdbh source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Dynamic.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: edputil.pdbi| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.904094735.00000000015B7000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: Microsoft.CSharp.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: indows.Forms.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscoree.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\System.Core.pdbz source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdb; source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.CSharp.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: powrprof.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: ole32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: iertutil.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: msasn1.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: version.pdb.B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shcore.pdb"B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ility.pdbU source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: combase.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000016.00000003.745706355.00000000027C1000.00000004.00000001.sdmp
        Source: Binary string: Windows.StateRepositoryPS.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: crypt32.pdb6By source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: profapi.pdb<B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: indows.Forms.pdb{{8 source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: ynamic.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: apphelp.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.pdb; source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: System.Xml.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: WinTypes.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Core.ni.pdbRSDSD source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: rawing.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: oleaut32.pdbB/ source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb|@ source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: CLBCatQ.pdbc| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: .pdb- source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: urlmon.pdb}| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: shcore.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.PDB source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: System.Core.ni.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: fltLib.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: cldapi.pdbq| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shell32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdbK[G source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: wimm32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Drawing.pdb; source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: wwin32u.pdb(B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: y3t4g48gj6_PAYMENT.PDBR source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb4 source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: Windows.StateRepositoryPS.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: rawing.pdbn source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: profapi.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: psapi.pdb=s. source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: WLDP.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb8 source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: sechost.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: clrjit.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ie.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: propsys.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb% source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.Drawing.pdbD source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: i8C:\Windows\System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbj source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: version.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: onfiguration.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: wintrust.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: cfgmgr32.pdb0B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: psapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Core.pdb{{# source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: cldapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000016.00000003.745736832.00000000027C7000.00000004.00000001.sdmp
        Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp, WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: combase.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.CSharp.pdb&& source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: OneCoreUAPCommonProxyStub.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: wuser32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Core.pdbk source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp
        Source: Binary string: System.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: crypt32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: edputil.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49763 -> 194.5.97.75:8090
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49768 -> 194.5.97.75:8090
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: omaprilcode.duckdns.org
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: omaprilcode.duckdns.org
        Source: global trafficTCP traffic: 192.168.2.4:49747 -> 194.5.97.75:8090
        Source: Joe Sandbox ViewIP Address: 194.5.97.75 194.5.97.75
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: svchost.exe, 0000001A.00000002.864871330.000001BB1C313000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI", equals www.facebook.com (Facebook)
        Source: svchost.exe, 0000001A.00000002.864871330.000001BB1C313000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI", equals www.twitter.com (Twitter)
        Source: svchost.exe, 0000001A.00000002.864871330.000001BB1C313000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-05-11T09:38:07.3274264Z||.||7e6d3bb3-74bc-4bd2-8463-13ea3a980d3c||1152921505693476823||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
        Source: svchost.exe, 0000001A.00000002.864871330.000001BB1C313000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-05-11T09:38:07.3274264Z||.||7e6d3bb3-74bc-4bd2-8463-13ea3a980d3c||1152921505693476823||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
        Source: svchost.exe, 0000001A.00000003.843517546.000001BB1C35F000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify Music","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI", equals www.facebook.com (Facebook)
        Source: svchost.exe, 0000001A.00000003.843517546.000001BB1C35F000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify Music","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI", equals www.twitter.com (Twitter)
        Source: svchost.exe, 0000001A.00000003.822109101.000001BB1C361000.00000004.00000001.sdmpString found in binary or memory: t enough.\r\n\r\nSHARE WITH FRIENDS\r\nSend photos and videos to keep your close friends up to speed. Receive files for even more productivity.\r\n\r\n\r\n*Calls are free over Wi-Fi but otherwise standard data charges apply.\r\nPrivacy Policy: https://www.facebook.com/about/privacy | LEARN MORE at: https://messenger.com (https://messenger.com/)","ProductTitle":"Messenger","SearchTitles":[],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9WZDNCRF0083","Properties":{"PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","PackageIdentityName":"FACEBOOK.317180B0BB486","PublisherCertificateName":"CN=6E08453F-9BA7-4311-999C-D22FBA2FB1B8","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"c6a9fa5c-20a2-4e12-904d-edd408657dc8"},{"IdType":"LegacyWindowsPhoneProductId","Value":"3219d30d-4a23-4f58-a91c-c44b04e6a0c7"},{"IdType":"XboxTitleId","Value":"2004208728"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-04-28T14:19:25.9172986Z||.||2e8b091b-9a79-4b36-a1ad-1238cc769fa9||1152921505693355901||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku":{"LastModifiedDate":"2021-04-28T14:18:40.1620745Z","LocalizedProperties":[{"SkuDescription":"Made for big screens and close connections. Get access to free* texting, and high-quality voice & video chat built specifically for desktop.\r\n\r\nMADE FOR DESKTOP, MADE
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e6c"},{"IdType":"XboxTitleId","Value":"2124184622"}],"IngestionSourc
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e6c"},{"IdType":"XboxTitleId","Value":"2124184622"}],"IngestionSourc
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e6c"},{"IdType":"XboxTitleId","Value":"2124184622"}],"IngestionSourc
        Source: svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","SkuTitle":"Hidden City: Hidden Object Adventure","Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NBLGGH6J6VK","Properties":{"FulfillmentData":{"ProductId":"9NBLGGH6J6VK","WuCategoryId":"e15668ee-9cc1-4bc2-ba76-e91eb1a11e95","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","SkuId":"0011"},"FulfillmentType":null,"FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"App"}],"Architectures":["x86"],"Capabilities":["internetClient"],"ExperienceIds":[],"MaxDownloadSizeInBytes":541214496,"PackageFormat":"EAppxBundle","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","MainPackageFamilyNameForDlc":null,"PackageFullName":"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6","PackageId":"b3805e6c-7a08-4cff-113c-76cb28cda307-X86","PackageRank":30011,"PlatformDependencies":[{"MaxTested":2814750931222528,"MinVersion":2814750438195200,"PlatformName":"Windows.Xbox"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.bundledPackages\":[\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_x86__ytsefhwckbdv6\"],\"content.isMain\":false,\"content.packageId\":\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6\",\"content.productId\":\"94ad5279-e84a-4d40-b7cf-c6f16f916e6c\",\"content.targetPlatforms\":[{\"platf
        Source: svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","SkuTitle":"Hidden City: Hidden Object Adventure","Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NBLGGH6J6VK","Properties":{"FulfillmentData":{"ProductId":"9NBLGGH6J6VK","WuCategoryId":"e15668ee-9cc1-4bc2-ba76-e91eb1a11e95","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","SkuId":"0011"},"FulfillmentType":null,"FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"App"}],"Architectures":["x86"],"Capabilities":["internetClient"],"ExperienceIds":[],"MaxDownloadSizeInBytes":541214496,"PackageFormat":"EAppxBundle","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","MainPackageFamilyNameForDlc":null,"PackageFullName":"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6","PackageId":"b3805e6c-7a08-4cff-113c-76cb28cda307-X86","PackageRank":30011,"PlatformDependencies":[{"MaxTested":2814750931222528,"MinVersion":2814750438195200,"PlatformName":"Windows.Xbox"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.bundledPackages\":[\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_x86__ytsefhwckbdv6\"],\"content.isMain\":false,\"content.packageId\":\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6\",\"content.productId\":\"94ad5279-e84a-4d40-b7cf-c6f16f916e6c\",\"content.targetPlatforms\":[{\"platf
        Source: svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","SkuTitle":"Hidden City: Hidden Object Adventure","Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NBLGGH6J6VK","Properties":{"FulfillmentData":{"ProductId":"9NBLGGH6J6VK","WuCategoryId":"e15668ee-9cc1-4bc2-ba76-e91eb1a11e95","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","SkuId":"0011"},"FulfillmentType":null,"FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"App"}],"Architectures":["x86"],"Capabilities":["internetClient"],"ExperienceIds":[],"MaxDownloadSizeInBytes":541214496,"PackageFormat":"EAppxBundle","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","MainPackageFamilyNameForDlc":null,"PackageFullName":"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6","PackageId":"b3805e6c-7a08-4cff-113c-76cb28cda307-X86","PackageRank":30011,"PlatformDependencies":[{"MaxTested":2814750931222528,"MinVersion":2814750438195200,"PlatformName":"Windows.Xbox"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.bundledPackages\":[\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_x86__ytsefhwckbdv6\"],\"content.isMain\":false,\"content.packageId\":\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6\",\"content.productId\":\"94ad5279-e84a-4d40-b7cf-c6f16f916e6c\",\"content.targetPlatforms\":[{\"platf
        Source: svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: % Regular free updates with loads of new content\r\n____________________________ \r\n\r\nGame available in: English, French, Italian, German, Spanish, Portuguese, Brazilian Portuguese, Russian, Korean, Simplified Chinese, Traditional Chinese, Japanese, Arabic\r\n____________________________ \r\n\r\nSign up now for a weekly round-up of the best from G5 Games! www.g5e.com/e-mail\r\n____________________________ \r\n\r\nG5 Games - World of Adventures"!!\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName
        Source: svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: % Regular free updates with loads of new content\r\n____________________________ \r\n\r\nGame available in: English, French, Italian, German, Spanish, Portuguese, Brazilian Portuguese, Russian, Korean, Simplified Chinese, Traditional Chinese, Japanese, Arabic\r\n____________________________ \r\n\r\nSign up now for a weekly round-up of the best from G5 Games! www.g5e.com/e-mail\r\n____________________________ \r\n\r\nG5 Games - World of Adventures"!!\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName
        Source: svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: % Regular free updates with loads of new content\r\n____________________________ \r\n\r\nGame available in: English, French, Italian, German, Spanish, Portuguese, Brazilian Portuguese, Russian, Korean, Simplified Chinese, Traditional Chinese, Japanese, Arabic\r\n____________________________ \r\n\r\nSign up now for a weekly round-up of the best from G5 Games! www.g5e.com/e-mail\r\n____________________________ \r\n\r\nG5 Games - World of Adventures"!!\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName
        Source: svchost.exe, 0000001A.00000003.822109101.000001BB1C361000.00000004.00000001.sdmpString found in binary or memory: t enough.\r\n\r\nSHARE WITH FRIENDS\r\nSend photos and videos to keep your close friends up to speed. Receive files for even more productivity.\r\n\r\n\r\n*Calls are free over Wi-Fi but otherwise standard data charges apply.\r\nPrivacy Policy: https://www.facebook.com/about/privacy | LEARN MORE at: https://messenger.com (https://messenger.com/)","ProductTitle":"Messenger","SearchTitles":[],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9WZDNCRF0083","Properties":{"PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","PackageIdentityName":"FACEBOOK.317180B0BB486","PublisherCertificateName":"CN=6E08453F-9BA7-4311-999C-D22FBA2FB1B8","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"c6a9fa5c-20a2-4e12-904d-edd408657dc8"},{"IdType":"LegacyWindowsPhoneProductId","Value":"3219d30d-4a23-4f58-a91c-c44b04e6a0c7"},{"IdType":"XboxTitleId","Value":"2004208728"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-04-28T14:19:25.9172986Z||.||2e8b091b-9a79-4b36-a1ad-1238cc769fa9||1152921505693355901||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku":{"LastModifiedDate":"2021-04-28T14:18:40.1620745Z","LocalizedProperties":[{"SkuDescription":"Made for big screens and close connections. Get access to free* texting, and high-quality voice & video chat built specifically for desktop.\r\n\r\nMADE FOR DESKTOP, MADE
        Source: svchost.exe, 0000001A.00000003.821971887.000001BB1C359000.00000004.00000001.sdmpString found in binary or memory: t enough.\r\n\r\nSHARE WITH FRIENDS\r\nSend photos and videos to keep your close friends up to speed. Receive files for even more productivity.\r\n\r\n\r\n*Calls are free over Wi-Fi but otherwise standard data charges apply.\r\nPrivacy Policy: https://www.facebook.com/about/privacy | LEARN MORE at: https://messenger.com (https://messenger.com/)","SkuTitle":"Messenger","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9WZDNCRF0083","Properties":{"FulfillmentData":{"ProductId":"9WZDNCRF0083","WuCategoryId":"c6a9fa5c-20a2-4e12-904d-edd408657dc8","PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","SkuId":"0010"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"App"}],"Architectures":["x64"],"Capabilities":["runFullTrust","internetClient","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":140842379,"PackageFormat":"Appx","PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","MainPackageFamilyNameForDlc":null,"PackageFullName":"FACEBOOK.317180B0BB486_970.11.116.0_x64__8xx8rvfyw5nnt","PackageId":"7f326ffb-6d38-0c43-2776-11d49b129880-X64","PackageRank":30002,"PlatformDependencies":[{"MaxTested":2814750970478592,"MinVersion":2814750438195200,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"FACEBOOK.317180B0BB486_970.11.116.0_x64__8xx8rvfyw5nnt\",\"content.productId\":\"3219d30d-4a23-4f58-a91c-c44b04e6a0c7\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750970478592,\"platform.minVersion\":2814750438195200,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Social\",\"optOut.bac
        Source: unknownDNS traffic detected: queries for: omaprilcode.duckdns.org
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
        Source: svchost.exe, 0000001A.00000002.861868933.000001BB1BACA000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
        Source: powershell.exe, 00000009.00000003.955076797.0000000008E7F000.00000004.00000001.sdmpString found in binary or memory: http://crl.mi&
        Source: powershell.exe, 00000007.00000003.977026096.0000000008F5D000.00000004.00000001.sdmpString found in binary or memory: http://crl.microsoft.co
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
        Source: svchost.exe, 0000001A.00000002.861868933.000001BB1BACA000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
        Source: svchost.exe, 0000001A.00000002.861868933.000001BB1BACA000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
        Source: svchost.exe, 0000001A.00000002.861868933.000001BB1BACA000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://ocsp.digicert.com0C
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://ocsp.digicert.com0O
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/locality
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://www.digicert.com/CPS0
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: http://www.g5e.com/G5_End_User_License_Supplemental_Terms
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: http://www.g5e.com/termsofservice
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://corp.roblox.com/contact/
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://corp.roblox.com/parents/
        Source: svchost.exe, 0000001A.00000002.860682383.000001BB1BA6F000.00000004.00000001.sdmpString found in binary or memory: https://displaycatalog.mp.microsoft
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://en.help.roblox.com/hc/en-us
        Source: powershell.exe, 00000007.00000003.882256216.0000000005A08000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.866423473.0000000005B0D000.00000004.00000001.sdmpString found in binary or memory: https://go.micro
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: https://instagram.com/hiddencity_
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: https://www.digicert.com/CPS0
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://www.roblox.com/develop
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://www.roblox.com/info/privacy

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORY
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: y3t4g48gj6_PAYMENT.exe
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile created: C:\Windows\Resources\Themes\agcQ435Jh2M0514Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_0316D220
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031689F0
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_03162010
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_0316EFD0
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031667D8
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_03160006
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_03160040
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_0316BE88
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031A0040
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031A6C39
        Source: Joe Sandbox ViewDropped File: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe 9F44F33F1B0B724292959B65AE6F2918CB1993641AD7832FFDBD68FC00FDDA2C
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: invalid certificate
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000000.653457414.0000000000DF2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs y3t4g48gj6_PAYMENT.exe
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWEMZ Fyj.exe2 vs y3t4g48gj6_PAYMENT.exe
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs y3t4g48gj6_PAYMENT.exe
        Source: y3t4g48gj6_PAYMENT.exe, 0000000F.00000000.720124138.0000000001062000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs y3t4g48gj6_PAYMENT.exe
        Source: y3t4g48gj6_PAYMENT.exeBinary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs y3t4g48gj6_PAYMENT.exe
        Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
        Source: classification engineClassification label: mal100.troj.evad.winEXE@31/21@5/1
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20210512Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f8dffc54-5ec5-4013-9de8-d8d853682f44}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6604:120:WilError_01
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6928
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5824:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7052:120:WilError_01
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uckgpted.as3.ps1Jump to behavior
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: y3t4g48gj6_PAYMENT.exeReversingLabs: Detection: 14%
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile read: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe'
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
        Source: unknownProcess created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe'
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
        Source: unknownProcess created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe'
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760
        Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: y3t4g48gj6_PAYMENT.exeStatic file information: File size 3867176 > 1048576
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3ae400
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: iertutil.pdbw| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: onfiguration.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: ml.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: .ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: clr.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: ility.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: advapi32.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Dynamic.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wuser32.pdbi source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: urlmon.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.CSharp.pdbh source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Dynamic.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: edputil.pdbi| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.904094735.00000000015B7000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: Microsoft.CSharp.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: indows.Forms.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscoree.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\System.Core.pdbz source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdb; source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.CSharp.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: powrprof.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: ole32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: iertutil.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: msasn1.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: version.pdb.B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shcore.pdb"B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ility.pdbU source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: combase.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000016.00000003.745706355.00000000027C1000.00000004.00000001.sdmp
        Source: Binary string: Windows.StateRepositoryPS.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: crypt32.pdb6By source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: profapi.pdb<B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: indows.Forms.pdb{{8 source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: ynamic.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: apphelp.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.pdb; source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: System.Xml.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: WinTypes.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Core.ni.pdbRSDSD source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: rawing.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: oleaut32.pdbB/ source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb|@ source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: CLBCatQ.pdbc| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: .pdb- source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: urlmon.pdb}| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: shcore.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.PDB source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: System.Core.ni.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: fltLib.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: cldapi.pdbq| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shell32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdbK[G source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: wimm32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Drawing.pdb; source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: wwin32u.pdb(B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: y3t4g48gj6_PAYMENT.PDBR source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb4 source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: Windows.StateRepositoryPS.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: rawing.pdbn source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: profapi.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: psapi.pdb=s. source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: WLDP.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb8 source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: sechost.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: clrjit.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ie.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: propsys.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb% source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.Drawing.pdbD source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: i8C:\Windows\System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbj source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: version.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: onfiguration.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: wintrust.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: cfgmgr32.pdb0B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: psapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Core.pdb{{# source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: cldapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000016.00000003.745736832.00000000027C7000.00000004.00000001.sdmp
        Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp, WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: combase.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.CSharp.pdb&& source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: OneCoreUAPCommonProxyStub.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: wuser32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Core.pdbk source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp
        Source: Binary string: System.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: crypt32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: edputil.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: 0xD9F65925 [Sat Nov 17 01:55:49 2085 UTC]
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_0316D8B0 push cs; iretd
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_03163008 push 4801843Dh; ret
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031695F0 push eax; iretd
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_03169420 push edx; iretd
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031AD9C0 push esp; retf

        Persistence and Installation Behavior:

        barindex
        Drops PE files with benign system namesShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeJump to dropped file
        Drops executables to the windows directory (C:\Windows) and starts themShow sources
        Source: unknownExecutable created and started: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeJump to dropped file
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeJump to dropped file

        Boot Survival:

        barindex
        Creates an autostart registry key pointing to binary in C:\WindowsShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile opened: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Tries to delay execution (extensive OutputDebugStringW loop)Show sources
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeSection loaded: OutputDebugStringW count: 135
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeSection loaded: OutputDebugStringW count: 115
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL/WINE_GET_UNIX_FILE_NAMEQEMU
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLLUSER
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3801
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3205
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4065
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2548
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4410
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2466
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeWindow / User API: threadDelayed 3735
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeWindow / User API: threadDelayed 5170
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeWindow / User API: foregroundWindowGot 574
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe TID: 6932Thread sleep count: 100 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4648Thread sleep time: -3689348814741908s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4648Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6692Thread sleep count: 4065 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6804Thread sleep count: 2548 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7120Thread sleep count: 52 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2228Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6776Thread sleep count: 4410 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6708Thread sleep count: 2466 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7060Thread sleep count: 60 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5788Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe TID: 2108Thread sleep time: -11068046444225724s >= -30000s
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe TID: 6632Thread sleep count: 100 > 30
        Source: C:\Windows\System32\svchost.exe TID: 5504Thread sleep time: -240000s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeLast function: Thread delayed
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread delayed: delay time: 922337203685477
        Source: powershell.exe, 00000005.00000003.947213916.0000000004AB7000.00000004.00000001.sdmp, powershell.exe, 00000007.00000003.945068005.0000000005696000.00000004.00000001.sdmpBinary or memory string: k:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
        Source: powershell.exe, 00000005.00000003.947213916.0000000004AB7000.00000004.00000001.sdmp, powershell.exe, 00000007.00000003.945068005.0000000005696000.00000004.00000001.sdmpBinary or memory string: Hyper-V
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: !noValueButYesKeySC:\WINDOWS\system32\drivers\VBoxMouse.sys
        Source: WerFault.exe, 00000016.00000002.875372877.0000000004620000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWpTr
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: VMWAREESOFTWARE\VMware, Inc.\VMware Tools
        Source: svchost.exe, 00000004.00000002.689700481.000001B37F940000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.748337376.000001D53AC60000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.879524137.0000000004920000.00000002.00000001.sdmp, svchost.exe, 00000018.00000002.791088837.000001ABD6740000.00000002.00000001.sdmp, svchost.exe, 0000001A.00000002.875331414.000001BB1CA00000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: WerFault.exe, 00000016.00000002.878996032.0000000004720000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.854618894.000001BB1BA4F000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: kernel32.dll/wine_get_unix_file_nameQEMU
        Source: svchost.exe, 00000004.00000002.689700481.000001B37F940000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.748337376.000001D53AC60000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.879524137.0000000004920000.00000002.00000001.sdmp, svchost.exe, 00000018.00000002.791088837.000001ABD6740000.00000002.00000001.sdmp, svchost.exe, 0000001A.00000002.875331414.000001BB1CA00000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: svchost.exe, 00000004.00000002.689700481.000001B37F940000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.748337376.000001D53AC60000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.879524137.0000000004920000.00000002.00000001.sdmp, svchost.exe, 00000018.00000002.791088837.000001ABD6740000.00000002.00000001.sdmp, svchost.exe, 0000001A.00000002.875331414.000001BB1CA00000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: VMwareVBox
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: InstallPathKC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\OC:\WINDOWS\system32\drivers\vmmouse.sysMC:\WINDOWS\system32\drivers\vmhgfs.sys
        Source: svchost.exe, 00000004.00000002.689700481.000001B37F940000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.748337376.000001D53AC60000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.879524137.0000000004920000.00000002.00000001.sdmp, svchost.exe, 00000018.00000002.791088837.000001ABD6740000.00000002.00000001.sdmp, svchost.exe, 0000001A.00000002.875331414.000001BB1CA00000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information queried: ProcessInformation

        Anti Debugging:

        barindex
        Hides threads from debuggersShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess queried: DebugPort
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess queried: DebugPort
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess token adjusted: Debug
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Adds a directory exclusion to Windows DefenderShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeMemory written: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe base: 400000 value starts with: 4D5A
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeMemory written: unknown base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760
        Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: unknown VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: unknown VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: unknown VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORY
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORY
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder11Process Injection111Masquerading221OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder11Disable or Modify Tools11LSASS MemorySecurity Software Discovery321Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion241Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSVirtualization/Sandbox Evasion241Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsTimestomp1DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery12Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 411524 Sample: y3t4g48gj6_PAYMENT.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 47 omaprilcode.duckdns.org 2->47 51 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->51 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 10 other signatures 2->57 8 y3t4g48gj6_PAYMENT.exe 3 6 2->8         started        12 svchost.exe 2->12         started        14 svchost.exe 2->14         started        16 5 other processes 2->16 signatures3 process4 file5 43 C:\Windows\Resources\Themes\...\svchost.exe, PE32 8->43 dropped 45 C:\Windows\...\svchost.exe:Zone.Identifier, ASCII 8->45 dropped 61 Creates an autostart registry key pointing to binary in C:\Windows 8->61 63 Adds a directory exclusion to Windows Defender 8->63 65 Tries to delay execution (extensive OutputDebugStringW loop) 8->65 73 2 other signatures 8->73 18 y3t4g48gj6_PAYMENT.exe 8->18         started        23 cmd.exe 8->23         started        25 powershell.exe 25 8->25         started        29 3 other processes 8->29 67 Multi AV Scanner detection for dropped file 12->67 69 Machine Learning detection for dropped file 12->69 71 Hides threads from debuggers 12->71 27 WerFault.exe 14->27         started        signatures6 process7 dnsIp8 49 omaprilcode.duckdns.org 194.5.97.75, 49763, 49768, 8090 DANILENKODE Netherlands 18->49 41 C:\Users\user\AppData\Roaming\...\run.dat, data 18->41 dropped 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->59 31 conhost.exe 23->31         started        33 timeout.exe 23->33         started        35 conhost.exe 25->35         started        37 conhost.exe 29->37         started        39 conhost.exe 29->39         started        file9 signatures10 process11

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        y3t4g48gj6_PAYMENT.exe15%ReversingLabsWin32.Trojan.Generic
        y3t4g48gj6_PAYMENT.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe100%Joe Sandbox ML
        C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe15%ReversingLabsWin32.Trojan.Generic

        Unpacked PE Files

        No Antivirus matches

        Domains

        SourceDetectionScannerLabelLink
        omaprilcode.duckdns.org3%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        omaprilcode.duckdns.org3%VirustotalBrowse
        omaprilcode.duckdns.org0%Avira URL Cloudsafe
        https://go.micro0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        http://crl.mi&0%Avira URL Cloudsafe
        https://displaycatalog.mp.microsoft0%Avira URL Cloudsafe
        http://crl.microsoft.co0%URL Reputationsafe
        http://crl.microsoft.co0%URL Reputationsafe
        http://crl.microsoft.co0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        omaprilcode.duckdns.org
        194.5.97.75
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        omaprilcode.duckdns.orgtrue
        • 3%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
          high
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifierWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
            high
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
              high
              https://corp.roblox.com/contact/svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                high
                https://go.micropowershell.exe, 00000007.00000003.882256216.0000000005A08000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.866423473.0000000005B0D000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://crl.mi&powershell.exe, 00000009.00000003.955076797.0000000008E7F000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                https://www.roblox.com/developsvchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                  high
                  https://instagram.com/hiddencity_svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphoneWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephoneWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovinceWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                          high
                          https://corp.roblox.com/parents/svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authenticationWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                  high
                                  https://displaycatalog.mp.microsoftsvchost.exe, 0000001A.00000002.860682383.000001BB1BA6F000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.g5e.com/G5_End_User_License_Supplemental_Termssvchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.oWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                        high
                                        http://crl.microsoft.copowershell.exe, 00000007.00000003.977026096.0000000008F5D000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.oWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                          high
                                          https://www.roblox.com/info/privacysvchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.g5e.com/termsofservicesvchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                                high
                                                https://en.help.roblox.com/hc/en-ussvchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                                    high

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    194.5.97.75
                                                    omaprilcode.duckdns.orgNetherlands
                                                    208476DANILENKODEtrue

                                                    General Information

                                                    Joe Sandbox Version:32.0.0 Black Diamond
                                                    Analysis ID:411524
                                                    Start date:12.05.2021
                                                    Start time:00:13:03
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 12m 34s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:y3t4g48gj6_PAYMENT.exe
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:33
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.evad.winEXE@31/21@5/1
                                                    EGA Information:
                                                    • Successful, ratio: 25%
                                                    HDC Information:
                                                    • Successful, ratio: 0% (good quality ratio 0%)
                                                    • Quality average: 0%
                                                    • Quality standard deviation: 0%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .exe
                                                    Warnings:
                                                    Show All
                                                    • Excluded IPs from analysis (whitelisted): 20.50.102.62, 40.88.32.150, 52.113.196.254, 13.107.3.254, 104.43.139.144, 92.122.145.220, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129, 20.82.209.183
                                                    • Excluded domains from analysis (whitelisted): s-ring.msedge.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, teams-9999.teams-msedge.net, e12564.dspb.akamaiedge.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, s-ring.s-9999.s-msedge.net, ris.api.iris.microsoft.com, s-9999.s-msedge.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, teams-ring.teams-9999.teams-msedge.net, teams-ring.msedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtSetInformationFile calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    00:14:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5 C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                    00:14:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5 C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                    00:14:34API Interceptor797x Sleep call for process: y3t4g48gj6_PAYMENT.exe modified
                                                    00:15:06API Interceptor154x Sleep call for process: powershell.exe modified
                                                    00:15:07API Interceptor10x Sleep call for process: svchost.exe modified
                                                    00:15:27API Interceptor1x Sleep call for process: WerFault.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    194.5.97.75y3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse
                                                      IPUt7Nr2CH.exeGet hashmaliciousBrowse
                                                        q19CDiK5TD.exeGet hashmaliciousBrowse
                                                          d9hGzIR8mh.exeGet hashmaliciousBrowse
                                                            6554353_Payment_Invoice.exeGet hashmaliciousBrowse

                                                              Domains

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              omaprilcode.duckdns.orgIPUt7Nr2CH.exeGet hashmaliciousBrowse
                                                              • 194.5.97.75
                                                              q19CDiK5TD.exeGet hashmaliciousBrowse
                                                              • 194.5.97.75

                                                              ASN

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              DANILENKODEy3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse
                                                              • 194.5.97.75
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.98.38
                                                              5lQuLT5Zu8.exeGet hashmaliciousBrowse
                                                              • 194.5.97.116
                                                              IPUt7Nr2CH.exeGet hashmaliciousBrowse
                                                              • 194.5.97.75
                                                              Passport_ID_jpg.jarGet hashmaliciousBrowse
                                                              • 194.5.98.228
                                                              Vd80r7R7K5.exeGet hashmaliciousBrowse
                                                              • 194.5.98.208
                                                              noVPhNP46G.exeGet hashmaliciousBrowse
                                                              • 194.5.98.208
                                                              LQ0dDP64uk.exeGet hashmaliciousBrowse
                                                              • 194.5.98.208
                                                              SCAN_DOCX-36673672.exeGet hashmaliciousBrowse
                                                              • 194.5.97.11
                                                              4b092c1e_by_Libranalysis.docxGet hashmaliciousBrowse
                                                              • 194.5.98.208
                                                              QW8lWJDpU8.exeGet hashmaliciousBrowse
                                                              • 194.5.98.5
                                                              2a8f04dd_by_Libranalysis.docmGet hashmaliciousBrowse
                                                              • 194.5.98.210
                                                              Invoice_orderYscFwfO1peuGl0w.exeGet hashmaliciousBrowse
                                                              • 194.5.98.250
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87
                                                              EFT payment.exeGet hashmaliciousBrowse
                                                              • 194.5.97.215
                                                              Contract_Documents_pdf.exeGet hashmaliciousBrowse
                                                              • 194.5.98.203
                                                              BANK DETAILS.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87

                                                              JA3 Fingerprints

                                                              No context

                                                              Dropped Files

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exey3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse

                                                                Created / dropped Files

                                                                C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_y3t4g48gj6_PAYME_ce53192e427e57e166223ab89fc2d2b1ddc61e_5e276ace_19efd6a0\Report.wer
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):15280
                                                                Entropy (8bit):3.775347590417521
                                                                Encrypted:false
                                                                SSDEEP:192:q/sAUZmHBUZMXyaKKIKZDnyK/u7sXS274It3y:VhQBUZMXyatyK/u7sXX4It3y
                                                                MD5:A94512BA4E48E8A4E173250156DA6D41
                                                                SHA1:63A3156CDA29FA63E43C13D73A22889D7DF25122
                                                                SHA-256:6F21687361C6811F7061DF732E21578B5D63A24976EF850E4128E44842B29D69
                                                                SHA-512:19559F7395B6EB6F26E843F1C1F5C023604E1A8802ACA72B169CB2D388DC9E8D36A6A72057D2CBE902592802C6E2AA97A2A61C020E3F3C112188FD3B2AFC98C8
                                                                Malicious:false
                                                                Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.5.2.4.4.8.8.1.1.0.3.1.3.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.5.2.4.4.9.2.5.0.5.6.1.3.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.0.3.3.3.b.2.8.-.1.b.5.1.-.4.b.3.d.-.b.8.0.6.-.1.d.2.7.f.a.d.b.b.9.1.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.d.f.0.1.6.b.-.e.2.1.b.-.4.2.a.f.-.a.9.1.5.-.8.5.3.8.d.7.0.b.5.c.e.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.3.t.4.g.4.8.g.j.6._.P.A.Y.M.E.N.T...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.v.a.l.u.e.i.n.f.i.n.i.t.e.V.M...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.1.0.-.0.0.0.1.-.0.0.1.b.-.9.4.4.4.-.6.d.e.d.b.2.4.6.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.6.e.f.1.2.5.e.5.0.7.7.7.c.1.9.0.1.6.8.b.0.9.3.3.d.c.1.b.0.4.1.0.0.0.0.0.0.0.0.!.0.0.0.0.e.3.8.1.0.d.2.1.6.0.0.b.b.0.1.1.3.b.
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FC3.tmp.dmp
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Mini DuMP crash report, 14 streams, Tue May 11 22:14:57 2021, 0x1205a4 type
                                                                Category:dropped
                                                                Size (bytes):305499
                                                                Entropy (8bit):3.8298999866185572
                                                                Encrypted:false
                                                                SSDEEP:3072:Tf80xXjd+pTMIkNU9gIOgF5PcB05TUCgU9o4BYtY/i9k0:Tk0epZ9RpDPcBmTTj99NS
                                                                MD5:7D130039893F26127B6B113B84A19BFB
                                                                SHA1:96FF809B293E3A8BEEE51865E62484569F83C3B9
                                                                SHA-256:3FA83E5961F135CFA73F0DB8D14F09BD94BFE9FA6A1974901E754C05336F0F25
                                                                SHA-512:212935D4DBEEEADA6EE29FBC5C88835C095A6A897502D281BCCE00BE35C25B90DF2A16FB7A1949A3A1B5130F47EDD7627DA51E7D7C8833EA5673B2B4832D6C74
                                                                Malicious:false
                                                                Preview: MDMP....... ..........`...................U...........B.......&......GenuineIntelW...........T..............`.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER7074.tmp.WERInternalMetadata.xml
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):8440
                                                                Entropy (8bit):3.7044703156329724
                                                                Encrypted:false
                                                                SSDEEP:192:Rrl7r3GLNiTW6f8e6YrgSUD3xizegmfZGSCM+prQ89buXsfxam:RrlsNiC696YsSUD3xJgmf0SgucfN
                                                                MD5:86EBB60ECFCDEE51CC5E2BA6D692B82D
                                                                SHA1:0BE08C903439560539DB77CF7006E2ECC85FA103
                                                                SHA-256:E38FBE59EAB3E0E38BD136F347B82B9EC76A4A7C4F88922B52003CADD66DAC04
                                                                SHA-512:61DB6130DB4A375E1E502CA5E8A983AE78596FAB17CC9B048BD33B4E847F5A92CBC45C11D304A9C78B429798CA1BFDFBF3B9B3F9639C78382502B810DBC296CD
                                                                Malicious:false
                                                                Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.2.8.<./.P.i.d.>.......
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER8A37.tmp.xml
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):4800
                                                                Entropy (8bit):4.516544893622802
                                                                Encrypted:false
                                                                SSDEEP:48:cvIwSD8zstJgtWI9mAWSC8Bl/8fm8M4JGFF/+q8vNgFrWgmibkJWBed:uITfHl5SNLkJGKusgsJWBed
                                                                MD5:7D19CCC31128554AAEB15798DF1DB3D7
                                                                SHA1:69382D763E87D9F30BAC581405DDB753BFB4CF2B
                                                                SHA-256:33B0D886F95B6191748DB94403FBC4F9E0A1545E39CDE58506D642C412F2E4E8
                                                                SHA-512:DE0505CB364DE9793513DE03BE92170EAADAE326CBC890AEA11A6B020519D6A63967A8D5334B0933057D4F83C72D5B9A3662D313BBD7DA35157C00C102394A76
                                                                Malicious:false
                                                                Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="985405" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER8AC2.tmp.csv
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):59720
                                                                Entropy (8bit):3.048130523171908
                                                                Encrypted:false
                                                                SSDEEP:1536:ShHV75zlWFhnmv+5+xqra1TBTf3ZMygYjtu7BJOejPW3Eoh8m:ShHV75zlWFhnmv+5+xqra1TBTf3ZMygW
                                                                MD5:CE3996BD9D5C68F023A1C9AD0DA4731A
                                                                SHA1:812DB2F7B714585F0220BB8B19420CC7E170A2AD
                                                                SHA-256:9F6A0607A749A170B9B589CCC4FC27213AD4CB6DCE0F6794B5F0B52F94A6CEAA
                                                                SHA-512:682A1D0A8209E48FD1CC2639B0EA4FA62FD97D5BFD49EEABF6AEE4E37EE17A1DB875C96C39849927D6D886D15FB04601AC186B903FFE191CBDC9C47D666A2A7A
                                                                Malicious:false
                                                                Preview: I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER93FA.tmp.txt
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):13340
                                                                Entropy (8bit):2.6972444993893148
                                                                Encrypted:false
                                                                SSDEEP:96:9GiZYW4/AdByYtY0rWt75HBYEZWpt6i9wMsDw6yUqGz2aFzxtKDFIr07f3:9jZDOKO7QQBJ2aFzxtK2r07f3
                                                                MD5:A1C6E15AA334B1AECE85CA59407134CB
                                                                SHA1:905391A1ADAE7CC71A6A0071EFDE7085F1B54715
                                                                SHA-256:8D2295E7C6F0A72BFD2E96B8E7464E37B92F5F292BBC5E24DDD2B5D4D9C5DD11
                                                                SHA-512:E6D85428869691D6C68C1DC63BFE2A6E04E74CFF6482C3705A3D3211025AB8DD9B15C3E10FB91B3763F5176BA3AB3BA29BFB4514BC0832E4ED0A8BF6A8B9A403
                                                                Malicious:false
                                                                Preview: B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.1.5.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:data
                                                                Category:modified
                                                                Size (bytes):14734
                                                                Entropy (8bit):4.996142136926143
                                                                Encrypted:false
                                                                SSDEEP:384:SEdVoGIpN6KQkj2Zkjh4iUxN0igHWrxSXX35fYoJib4J:SYV3IpNBQkj2Yh4iUxN0igHWrxSH3VYO
                                                                MD5:56DB04A4DAB9C936C40C58D7FA8A00E3
                                                                SHA1:1201D3473239F5F79D26EB7F9C5E56E7C0E96A53
                                                                SHA-256:F2E111C84424451D2F71EA3C015B9A01A1B01D24BA0621206C5196DE3EE37496
                                                                SHA-512:DBA211C75EF3B5EBEF4467AD861A146EEC316CF4DD886D730B97FCDB895BB49C2915928600211115064F074A09A11DF3B06083730D4893C83E0D73E06D524C51
                                                                Malicious:false
                                                                Preview: PSMODULECACHE.............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script................T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1oxbwxew.pcj.psm1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e0o1odeg.iei.psm1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mvyyesyi.piw.psm1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uckgpted.as3.ps1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zhp5apco.gly.ps1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmccu5xf.g3m.ps1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                Process:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):8
                                                                Entropy (8bit):3.0
                                                                Encrypted:false
                                                                SSDEEP:3:DpYn:1Yn
                                                                MD5:A5A28903921B20910E2EE7091732DE1C
                                                                SHA1:0873906F993AA5469C444E7DD37A6A3BD759CE6D
                                                                SHA-256:90134F63A5D6F12BD0BB86A4619DE54E09828CA8EC67B34C552B236815A74D9F
                                                                SHA-512:489CB1556C899A3A2D7551464C0B746CD07D9E77A69BB2B7CEE4F0066F555E2EF46C1934EFDCE094C029B5BDD47C2273C47F3999C1B493ABBF0BF13CF4B47B4E
                                                                Malicious:true
                                                                Preview: )g.(...H
                                                                C:\Users\user\Documents\20210512\PowerShell_transcript.141700.74EAy5QA.20210512001414.txt
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1706
                                                                Entropy (8bit):5.321385688312608
                                                                Encrypted:false
                                                                SSDEEP:48:BZ8Vvj1oO+SWsMqDYB1ZHdW2Zfvj1oO+SWsMqDYB1ZuG:BZ8Zj1NQpqDo1Z42Z3j1NQpqDo1ZuG
                                                                MD5:A45AE807B95F637802628FC6E2D6855C
                                                                SHA1:AD0A9D935A4DED5C2E1576EDFB81424BD3E91E4C
                                                                SHA-256:FEDD06D6E15A769CDC0998779A4E8E04A0E9C4085AAFD23D0757EFC999597001
                                                                SHA-512:BB743F38FDD23931F69727AEF16743C9B33E9C38475DEF13C4A8E2AD171564CDA9776E60F28214612D6D8CA0DE38EC54E509BDBD0659E39F3E1096CD63423EE7
                                                                Malicious:false
                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512001448..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 141700 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe -Force..Process ID: 6824..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210512001449..**********************..PS>Add-MpPreference -ExclusionPath C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe -Force..**********************..Windows PowerShell transcript start..Start time: 20210512001610..Username: computer\user
                                                                C:\Users\user\Documents\20210512\PowerShell_transcript.141700.GKdgCFyc.20210512001413.txt
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):860
                                                                Entropy (8bit):5.361096625858647
                                                                Encrypted:false
                                                                SSDEEP:24:BxSAWC7vBZ1x2DOXUWeSuaEvAWbHjeTKKjX4CIym1ZJX+XuaEv8:BZpvj1oO+SKbqDYB1Zsr
                                                                MD5:44D3B6228F41D5E622F8E2A8BF9FAAE0
                                                                SHA1:D88312467F11837CE780438435288535BB082BC6
                                                                SHA-256:214B12327DFED7D0D6C2A5E204DBBBA48708EA75BEB402567A95A82BD4B307CE
                                                                SHA-512:2BA4E2248CB8C87412AE724C080734223933F07F69566436F45F3998ED9155C1D6BB0D09581F057F57619A196CD1CD48E14D03C4A442C518AB158508B45FA9D6
                                                                Malicious:false
                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512001447..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 141700 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe -Force..Process ID: 6328..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210512001448..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe -Force..
                                                                C:\Users\user\Documents\20210512\PowerShell_transcript.141700.ji+N4HzO.20210512001411.txt
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1574
                                                                Entropy (8bit):5.3402451113638065
                                                                Encrypted:false
                                                                SSDEEP:48:BZevj1oO+SWsjqDYB1ZjW2ZQHvj1oO+SWsjqDYB1ZA:BZSj1NQKqDo1Zi2ZKj1NQKqDo1ZA
                                                                MD5:323E7CEE88FEB16FE654554C45E4EE10
                                                                SHA1:B726DF3FB4AB7486542B8C0D018C4F80A6F65924
                                                                SHA-256:0AEDBE761059CF8244C89916D84505CDBBDFE20B752EE0334C44FC9486AC50C3
                                                                SHA-512:554AA6C8E5E4DA4E743355BD9D25BC069C70331120AA179B4734C3DC24726B57F71EA4FA733C6CAEF6103793B0FC9E5FAFF9E07804BA9038A9E74616D40C42E0
                                                                Malicious:false
                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512001435..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 141700 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe -Force..Process ID: 1376..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210512001436..**********************..PS>Add-MpPreference -ExclusionPath C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe -Force..**********************..Windows PowerShell transcript start..Start time: 20210512002108..Username: computer\user
                                                                C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                                Process:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):3867176
                                                                Entropy (8bit):2.590642055759663
                                                                Encrypted:false
                                                                SSDEEP:24576:Bg2krlcNk1WgwmNHtf+Gqwqf/JOy0h1qMEIGCjx9h3CIf9rMRrdA7w1cYAnXs6M7:Bh
                                                                MD5:9998F7E0C708BA1FA4B56235A9811C0F
                                                                SHA1:E3810D21600BB0113B2D7116347326BEB6A35D83
                                                                SHA-256:9F44F33F1B0B724292959B65AE6F2918CB1993641AD7832FFDBD68FC00FDDA2C
                                                                SHA-512:69A0FEA89ADC2F259624E6ABA5CF20194A904E8656444DF6894785775F57DAEC33AB08903D5147152482D7CFAAFF91C30FA51965FE472EB1E91DF42B709432F2
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 15%
                                                                Joe Sandbox View:
                                                                • Filename: y3t4g48gj6_PAYMENT.exe, Detection: malicious, Browse
                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...%Y............"...0...:...........;.. ... ;...@.. .......................`;.....5S;...@...................................;.O.... ;...............:.(....@;...................................................... ............... ..H............text...4.:.. ....:................. ..`.rsrc........ ;.......:.............@..@.reloc.......@;.......:.............@..B..................;.....H.......`$..|.:..........#...............................................*&.(......*".......*".(.....*Vs....(....t.........*6.rK..p(.....*".(.....*.s.........*..0..9........~.........,".r...p.....(....o....s............~.....+..*....0...........~.....+..*..0...........~.....+..*..0............(.....+.+........*.0..9.............r.:p+........(....(......(.......(......................%.. .o.........+L..........r..:p(........,.+*..o...........,.+...(.......~......o.........X..
                                                                C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe:Zone.Identifier
                                                                Process:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:true
                                                                Preview: [ZoneTransfer]....ZoneId=0

                                                                Static File Info

                                                                General

                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):2.590642055759663
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:y3t4g48gj6_PAYMENT.exe
                                                                File size:3867176
                                                                MD5:9998f7e0c708ba1fa4b56235a9811c0f
                                                                SHA1:e3810d21600bb0113b2d7116347326beb6a35d83
                                                                SHA256:9f44f33f1b0b724292959b65ae6f2918cb1993641ad7832ffdbd68fc00fdda2c
                                                                SHA512:69a0fea89adc2f259624e6aba5cf20194a904e8656444df6894785775f57daec33ab08903d5147152482d7cfaaff91c30fa51965fe472eb1e91df42b709432f2
                                                                SSDEEP:24576:Bg2krlcNk1WgwmNHtf+Gqwqf/JOy0h1qMEIGCjx9h3CIf9rMRrdA7w1cYAnXs6M7:Bh
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...%Y............"...0...:...........;.. ... ;...@.. .......................`;.....5S;...@................................

                                                                File Icon

                                                                Icon Hash:00828e8e8686b000

                                                                Static PE Info

                                                                General

                                                                Entrypoint:0x7b032e
                                                                Entrypoint Section:.text
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                Time Stamp:0xD9F65925 [Sat Nov 17 01:55:49 2085 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:v4.0.30319
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                Authenticode Signature

                                                                Signature Valid:false
                                                                Signature Issuer:C=by64bc71k4HZ0Yw5C4bba6cc73Yfz0a, S=H9a5205c91ku3, L=5Jp25b35, T=NweE2NdNRd1J7Jb5wDdffe141z527c2ci41dgw3, E=4rhdU4t04, OU=484d0C6323bzd4c97q3, O=bR673KfoLs612894halpX4a4d0qGA2d583, CN=44Ql7muB5F53555J17d1o
                                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                Error Number:-2146762487
                                                                Not Before, Not After
                                                                • 5/11/2021 4:54:44 PM 5/11/2022 4:54:44 PM
                                                                Subject Chain
                                                                • C=by64bc71k4HZ0Yw5C4bba6cc73Yfz0a, S=H9a5205c91ku3, L=5Jp25b35, T=NweE2NdNRd1J7Jb5wDdffe141z527c2ci41dgw3, E=4rhdU4t04, OU=484d0C6323bzd4c97q3, O=bR673KfoLs612894halpX4a4d0qGA2d583, CN=44Ql7muB5F53555J17d1o
                                                                Version:3
                                                                Thumbprint MD5:987431C54CFEF315C111B5AB521BCAC1
                                                                Thumbprint SHA-1:DD65EBFE2F0AF6EC396DC73C4A037E87E321A06B
                                                                Thumbprint SHA-256:93C6C15FCE022D65F38E693A5BADB285F2BE5AC5EC2BFC2707FBF16E192C6E96
                                                                Serial:00BEABD3255E63776CE32FBB6B780B4783

                                                                Entrypoint Preview

                                                                Instruction
                                                                jmp dword ptr [00402000h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al

                                                                Data Directories

                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3b02dc0x4f.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b20000x5d8.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x3aee000x1428.text
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3b40000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                Sections

                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000x3ae3340x3ae400unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x3b20000x5d80x600False0.421223958333data4.14589146106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x3b40000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                Resources

                                                                NameRVASizeTypeLanguageCountry
                                                                RT_VERSION0x3b20a00x34cdata
                                                                RT_MANIFEST0x3b23ec0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                Imports

                                                                DLLImport
                                                                mscoree.dll_CorExeMain

                                                                Version Infos

                                                                DescriptionData
                                                                Translation0x0000 0x04b0
                                                                LegalCopyrightCopyright 2021
                                                                Assembly Version1.0.0.0
                                                                InternalNamevalueinfiniteVM.exe
                                                                FileVersion1.0.0.0
                                                                CompanyName
                                                                LegalTrademarks
                                                                Comments
                                                                ProductNamevalueinfiniteVM
                                                                ProductVersion1.0.0.0
                                                                FileDescriptionvalueinfiniteVM
                                                                OriginalFilenamevalueinfiniteVM.exe

                                                                Network Behavior

                                                                Snort IDS Alerts

                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                05/12/21-00:13:48.392906ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                                                05/12/21-00:15:31.723102TCP2025019ET TROJAN Possible NanoCore C2 60B497638090192.168.2.4194.5.97.75
                                                                05/12/21-00:16:04.101380TCP2025019ET TROJAN Possible NanoCore C2 60B497688090192.168.2.4194.5.97.75

                                                                Network Port Distribution

                                                                TCP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                May 12, 2021 00:14:43.788465023 CEST497478090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:14:46.792166948 CEST497478090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:14:52.808243990 CEST497478090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:10.322053909 CEST497548090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:13.325598955 CEST497548090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:19.341764927 CEST497548090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:28.145988941 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:31.155237913 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:31.301479101 CEST809049763194.5.97.75192.168.2.4
                                                                May 12, 2021 00:15:31.301733017 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:31.723102093 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:33.773086071 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:34.309803963 CEST809049763194.5.97.75192.168.2.4
                                                                May 12, 2021 00:15:34.309879065 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:40.307595968 CEST809049763194.5.97.75192.168.2.4
                                                                May 12, 2021 00:15:40.307760000 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:41.792853117 CEST497648090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:44.789021969 CEST497648090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:50.797631979 CEST497648090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:03.954149008 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:04.100481987 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:04.100650072 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:04.101380110 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:04.533061028 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:04.730457067 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:04.783890963 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:04.812871933 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:05.236252069 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:05.767527103 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:06.542301893 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:06.542392015 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:06.673913956 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:08.632468939 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:09.934705019 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:09.934843063 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:10.564354897 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:12.471256971 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:12.615432978 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:12.674413919 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:13.238096952 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:16.402070045 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:16.402164936 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:23.840174913 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:23.840329885 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:24.225354910 CEST497688090192.168.2.4194.5.97.75

                                                                UDP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                May 12, 2021 00:13:47.283850908 CEST5453153192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:47.349101067 CEST53545318.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:48.318806887 CEST5453153192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:48.392785072 CEST53545318.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:48.682116985 CEST4971453192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:48.713285923 CEST5802853192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:48.732155085 CEST53497148.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:48.771641016 CEST53580288.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:49.002873898 CEST5309753192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:49.053747892 CEST53530978.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:50.382838964 CEST4925753192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:50.434345007 CEST53492578.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:51.293567896 CEST6238953192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:51.345249891 CEST53623898.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:52.441109896 CEST4991053192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:52.482429981 CEST5585453192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:52.492783070 CEST53499108.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:52.546390057 CEST53558548.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:53.612421989 CEST6454953192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:53.663944960 CEST53645498.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:54.774204016 CEST6315353192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:54.825186968 CEST53631538.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:55.702600956 CEST5299153192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:55.761754990 CEST53529918.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:58.134063005 CEST5370053192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:58.193779945 CEST53537008.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:58.962601900 CEST5172653192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:59.015543938 CEST53517268.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:59.989438057 CEST5679453192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:00.039705992 CEST53567948.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:00.903989077 CEST5653453192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:00.963895082 CEST53565348.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:01.891772985 CEST5662753192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:01.942437887 CEST53566278.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:02.808167934 CEST5662153192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:02.858401060 CEST53566218.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:03.662923098 CEST6311653192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:03.714517117 CEST53631168.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:05.820904970 CEST6407853192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:05.870121956 CEST53640788.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:06.680989981 CEST6480153192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:06.741204023 CEST53648018.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:07.580405951 CEST6172153192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:07.630373955 CEST53617218.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:09.403549910 CEST5125553192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:09.452264071 CEST53512558.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:12.811872959 CEST6152253192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:12.873574018 CEST53615228.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:13.833559036 CEST5233753192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:13.885293007 CEST53523378.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:23.476809978 CEST5504653192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:23.534064054 CEST53550468.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:43.556190014 CEST4961253192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:43.774633884 CEST53496128.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:44.364456892 CEST4928553192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:44.423496962 CEST53492858.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:06.603167057 CEST5060153192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:06.708455086 CEST53506018.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:07.856023073 CEST6087553192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:07.925179005 CEST53608758.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:07.970230103 CEST5644853192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:08.027524948 CEST53564488.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:09.296216011 CEST5917253192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:09.353558064 CEST53591728.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:09.734013081 CEST6242053192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:09.795109034 CEST53624208.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:10.081043959 CEST6057953192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:10.142817974 CEST53605798.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:11.973925114 CEST5018353192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:12.081794977 CEST53501838.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:13.219671965 CEST6153153192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:13.276786089 CEST53615318.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:14.196436882 CEST4922853192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:14.256056070 CEST53492288.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:18.381433010 CEST5979453192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:18.438376904 CEST53597948.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:22.224236965 CEST5591653192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:22.273957014 CEST53559168.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:23.093343973 CEST5275253192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:23.154314995 CEST53527528.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:27.617356062 CEST6054253192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:27.680609941 CEST53605428.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:28.082577944 CEST6068953192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:28.141998053 CEST53606898.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:41.733375072 CEST6420653192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:41.790450096 CEST53642068.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:00.114984989 CEST5090453192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:00.182513952 CEST53509048.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:03.691982985 CEST5752553192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:03.920447111 CEST53575258.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:10.178857088 CEST5381453192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:10.237946033 CEST53538148.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:25.184329987 CEST5341853192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:25.242866993 CEST53534188.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:29.544163942 CEST6283353192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:29.595927954 CEST53628338.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:34.992768049 CEST5926053192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:35.050043106 CEST53592608.8.8.8192.168.2.4

                                                                ICMP Packets

                                                                TimestampSource IPDest IPChecksumCodeType
                                                                May 12, 2021 00:13:48.392905951 CEST192.168.2.48.8.8.8d05e(Port unreachable)Destination Unreachable

                                                                DNS Queries

                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                May 12, 2021 00:14:43.556190014 CEST192.168.2.48.8.8.80x962aStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:09.734013081 CEST192.168.2.48.8.8.80xb6e0Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:28.082577944 CEST192.168.2.48.8.8.80x9971Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:41.733375072 CEST192.168.2.48.8.8.80xb1aaStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                                                                May 12, 2021 00:16:03.691982985 CEST192.168.2.48.8.8.80x4279Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)

                                                                DNS Answers

                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                May 12, 2021 00:14:43.774633884 CEST8.8.8.8192.168.2.40x962aNo error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:09.795109034 CEST8.8.8.8192.168.2.40xb6e0No error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:28.141998053 CEST8.8.8.8192.168.2.40x9971No error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:41.790450096 CEST8.8.8.8192.168.2.40xb1aaNo error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)
                                                                May 12, 2021 00:16:03.920447111 CEST8.8.8.8192.168.2.40x4279No error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)

                                                                Code Manipulations

                                                                Statistics

                                                                Behavior

                                                                Click to jump to process

                                                                System Behavior

                                                                General

                                                                Start time:00:13:53
                                                                Start date:12/05/2021
                                                                Path:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe'
                                                                Imagebase:0xa40000
                                                                File size:3867176 bytes
                                                                MD5 hash:9998F7E0C708BA1FA4B56235A9811C0F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                Reputation:low

                                                                General

                                                                Start time:00:14:04
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:07
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
                                                                Imagebase:0x3f0000
                                                                File size:430592 bytes
                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:07
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff724c50000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:08
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force
                                                                Imagebase:0x3f0000
                                                                File size:430592 bytes
                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:09
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff724c50000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:09
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
                                                                Imagebase:0x3f0000
                                                                File size:430592 bytes
                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:11
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff724c50000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:15
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
                                                                Imagebase:0x11d0000
                                                                File size:232960 bytes
                                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:15
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff724c50000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:15
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\timeout.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:timeout 1
                                                                Imagebase:0x12a0000
                                                                File size:26112 bytes
                                                                MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:14:21
                                                                Start date:12/05/2021
                                                                Path:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                Imagebase:0xcb0000
                                                                File size:3867176 bytes
                                                                MD5 hash:9998F7E0C708BA1FA4B56235A9811C0F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET

                                                                General

                                                                Start time:00:14:23
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe'
                                                                Imagebase:0x4f0000
                                                                File size:3867176 bytes
                                                                MD5 hash:9998F7E0C708BA1FA4B56235A9811C0F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 15%, ReversingLabs

                                                                General

                                                                Start time:00:14:23
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:14:30
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:14:31
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
                                                                Imagebase:0xa0000
                                                                File size:434592 bytes
                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:14:32
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe'
                                                                Imagebase:0xac0000
                                                                File size:3867176 bytes
                                                                MD5 hash:9998F7E0C708BA1FA4B56235A9811C0F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET

                                                                General

                                                                Start time:00:14:32
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760
                                                                Imagebase:0xa0000
                                                                File size:434592 bytes
                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET

                                                                General

                                                                Start time:00:14:44
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:15:01
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                Disassembly

                                                                Code Analysis

                                                                Reset < >