Loading ...

Play interactive tourEdit tour

Analysis Report CONTRACT.exe

Overview

General Information

Sample Name:CONTRACT.exe
Analysis ID:431926
MD5:02430d34be900990fbf6a7efe35a7c64
SHA1:00b40170c46ae026cf518588d5b6177538bb1036
SHA256:80ca460c629559cf38e1244983877ed9c041c636c1f2e7e388ae2f9ba4d06788
Tags:exeNanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected AntiVM3
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • CONTRACT.exe (PID: 6344 cmdline: 'C:\Users\user\Desktop\CONTRACT.exe' MD5: 02430D34BE900990FBF6A7EFE35A7C64)
    • schtasks.exe (PID: 6092 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp99D6.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • CONTRACT.exe (PID: 6168 cmdline: {path} MD5: 02430D34BE900990FBF6A7EFE35A7C64)
      • schtasks.exe (PID: 5892 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA9F3.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • CONTRACT.exe (PID: 4600 cmdline: C:\Users\user\Desktop\CONTRACT.exe 0 MD5: 02430D34BE900990FBF6A7EFE35A7C64)
    • schtasks.exe (PID: 6440 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp372F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • CONTRACT.exe (PID: 5952 cmdline: {path} MD5: 02430D34BE900990FBF6A7EFE35A7C64)
    • CONTRACT.exe (PID: 1388 cmdline: {path} MD5: 02430D34BE900990FBF6A7EFE35A7C64)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "30b6fbac-dd0d-47bd-b8ab-6df66b01", "Group": "Default", "Domain1": "kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu", "Domain2": "", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.415", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x236cb:$a: NanoCore
      • 0x23724:$a: NanoCore
      • 0x23761:$a: NanoCore
      • 0x237da:$a: NanoCore
      • 0x2372d:$b: ClientPlugin
      • 0x2376a:$b: ClientPlugin
      • 0x24068:$b: ClientPlugin
      • 0x24075:$b: ClientPlugin
      • 0x1b453:$e: KeepAlive
      • 0x23bb5:$g: LogClientMessage
      • 0x23b35:$i: get_Connected
      • 0x156fd:$j: #=q
      • 0x1572d:$j: #=q
      • 0x15769:$j: #=q
      • 0x15791:$j: #=q
      • 0x157c1:$j: #=q
      • 0x157f1:$j: #=q
      • 0x15821:$j: #=q
      • 0x15851:$j: #=q
      • 0x1586d:$j: #=q
      • 0x1589d:$j: #=q
      Click to see the 41 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      28.0.CONTRACT.exe.400000.1.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      28.0.CONTRACT.exe.400000.1.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      28.0.CONTRACT.exe.400000.1.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        28.0.CONTRACT.exe.400000.1.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        15.2.CONTRACT.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        Click to see the 76 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CONTRACT.exe, ProcessId: 6168, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CONTRACT.exe, ProcessId: 6168, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CONTRACT.exe, ProcessId: 6168, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CONTRACT.exe, ProcessId: 6168, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "30b6fbac-dd0d-47bd-b8ab-6df66b01", "Group": "Default", "Domain1": "kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu", "Domain2": "", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.415", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\QnctWeFrWlqq.exeReversingLabs: Detection: 36%
        Multi AV Scanner detection for submitted fileShow sources
        Source: CONTRACT.exeReversingLabs: Detection: 36%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425626395.0000000003CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 6168, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 1388, type: MEMORY
        Source: Yara matchFile source: 28.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ce9cd6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b24629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3deeb0c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CONTRACT.exe.da294b8.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3cf3135.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3de9cd6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b20000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CONTRACT.exe.da294b8.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3deeb0c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b20000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ceeb0c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ceeb0c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.CONTRACT.exe.46be418.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.CONTRACT.exe.46be418.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3df3135.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\QnctWeFrWlqq.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: CONTRACT.exeJoe Sandbox ML: detected
        Source: 15.2.CONTRACT.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 28.0.CONTRACT.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 15.0.CONTRACT.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 15.2.CONTRACT.exe.5b20000.11.unpackAvira: Label: TR/NanoCore.fadte
        Source: 15.0.CONTRACT.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 28.0.CONTRACT.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 28.2.CONTRACT.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: CONTRACT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\CONTRACT.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: CONTRACT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: CONTRACT.exe, 00000000.00000002.331511150.0000000007640000.00000002.00000001.sdmp, CONTRACT.exe, 0000000F.00000002.507447877.0000000005710000.00000002.00000001.sdmp, CONTRACT.exe, 00000012.00000002.416976159.0000000006C60000.00000002.00000001.sdmp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu
        Source: global trafficTCP traffic: 192.168.2.5:49713 -> 185.140.53.135:1187
        Source: Joe Sandbox ViewIP Address: 185.140.53.135 185.140.53.135
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: unknownDNS traffic detected: queries for: kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: CONTRACT.exe, 00000000.00000003.235560856.0000000005A80000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: CONTRACT.exe, 00000000.00000003.238068775.0000000005A7D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersb
        Source: CONTRACT.exe, 00000000.00000003.319401814.0000000005A70000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
        Source: CONTRACT.exe, 00000000.00000003.319401814.0000000005A70000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.come.com
        Source: CONTRACT.exe, 00000000.00000003.319401814.0000000005A70000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comion
        Source: CONTRACT.exe, 00000000.00000003.319401814.0000000005A70000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comm
        Source: CONTRACT.exe, 00000000.00000003.232678625.0000000005A8B000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: CONTRACT.exe, 00000000.00000003.232678625.0000000005A8B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com8
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000000.00000003.234802969.0000000005AAD000.00000004.00000001.sdmp, CONTRACT.exe, 00000000.00000003.235175021.0000000005A74000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: CONTRACT.exe, 00000000.00000003.235175021.0000000005A74000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: CONTRACT.exe, 00000000.00000003.234859930.0000000005A74000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn1
        Source: CONTRACT.exe, 00000000.00000003.234859930.0000000005A74000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnPq
        Source: CONTRACT.exe, 00000000.00000003.234802969.0000000005AAD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnl-g
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: CONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Cg
        Source: CONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0z
        Source: CONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ita
        Source: CONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: CONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Qg3
        Source: CONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/n
        Source: CONTRACT.exe, 00000000.00000003.232678625.0000000005A8B000.00000004.00000001.sdmp, CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: CONTRACT.exe, 00000000.00000003.233856245.0000000005A76000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krl
        Source: CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: CONTRACT.exe, 00000000.00000003.232884277.0000000005A8B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comcm
        Source: CONTRACT.exe, 00000000.00000003.232943546.0000000005A8B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comnm
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: CONTRACT.exe, 00000000.00000002.321826037.0000000001640000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: CONTRACT.exe, 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425626395.0000000003CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 6168, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 1388, type: MEMORY
        Source: Yara matchFile source: 28.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ce9cd6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b24629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3deeb0c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CONTRACT.exe.da294b8.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3cf3135.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3de9cd6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b20000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CONTRACT.exe.da294b8.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3deeb0c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b20000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ceeb0c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ceeb0c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.CONTRACT.exe.46be418.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.CONTRACT.exe.46be418.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3df3135.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.507246807.0000000005330000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.425626395.0000000003CA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: CONTRACT.exe PID: 6168, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: CONTRACT.exe PID: 6168, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: CONTRACT.exe PID: 1388, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: CONTRACT.exe PID: 1388, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.CONTRACT.exe.3ce9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.CONTRACT.exe.3ce9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.CONTRACT.exe.5330000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.CONTRACT.exe.5b24629.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.CONTRACT.exe.3deeb0c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.CONTRACT.exe.da294b8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.CONTRACT.exe.da294b8.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.CONTRACT.exe.2cc38ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.CONTRACT.exe.3cf3135.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.CONTRACT.exe.3de9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.CONTRACT.exe.3de9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.CONTRACT.exe.5b20000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.CONTRACT.exe.da294b8.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.CONTRACT.exe.da294b8.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.CONTRACT.exe.3deeb0c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.CONTRACT.exe.5b20000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.CONTRACT.exe.3ceeb0c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.CONTRACT.exe.3ceeb0c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.CONTRACT.exe.46be418.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.CONTRACT.exe.46be418.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.CONTRACT.exe.46be418.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.CONTRACT.exe.46be418.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.CONTRACT.exe.3df3135.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.CONTRACT.exe.2db12f4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_0504152A NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_050414EF NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320A320
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03202720
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320BEA0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03209EE0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320B560
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320F140
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320ADB8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320CD98
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_032059E0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03205C48
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03209858
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_032094C8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320DB28
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03202710
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320EB48
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_032057BF
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320EF90
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03206247
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03206258
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03205917
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320ED40
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320E5A0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320B998
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03205C38
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320586F
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_0320E840
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03205841
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_032058B1
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_032058CB
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07481758
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07481318
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07480070
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07483690
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07481748
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07480540
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07480550
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07482F78
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07483F78
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07480B19
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07481311
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07483F28
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07484529
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07480B20
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07484538
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07481FEC
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07482F88
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07483F88
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07481A7F
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07480006
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07482006
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07482028
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07483680
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_07481A90
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EE3850
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EE86A8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EE92A8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EE2FA8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EE23A0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EEAF31
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EE306F
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EE95BB
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EE936F
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_04EE9B50
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577B560
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577F140
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_057759E0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577ADB8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577CD98
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05779858
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05775C48
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_057794C8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577A320
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05772720
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05779EE0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577BEA0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577ED40
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_057755B1
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577E5A0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577B998
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577E840
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05775C38
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_057758CB
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577EB48
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577DB28
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05772710
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_0577EF90
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05776258
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05776247
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F41E0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F3610
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F0070
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F1318
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F3918
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F1316
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F3F08
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F2F38
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F0B20
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F1758
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F0550
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F1748
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F0540
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F2F78
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F2F88
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F41D1
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F0006
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F3600
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F2028
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F2026
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F1A41
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F1640
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F1A7F
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F1A90
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F44B8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F44B6
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F3EA8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F0AC7
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F3EF8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_071F0AF1
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 28_2_00F82FA8
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 28_2_00F823A0
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 28_2_00F83850
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 28_2_00F8306F
        Source: CONTRACT.exe, 00000000.00000002.320453077.0000000000E70000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamep6FirY.exeR vs CONTRACT.exe
        Source: CONTRACT.exe, 00000000.00000002.321826037.0000000001640000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs CONTRACT.exe
        Source: CONTRACT.exe, 00000000.00000002.330904879.00000000071D0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs CONTRACT.exe
        Source: CONTRACT.exe, 00000000.00000002.331227731.0000000007500000.00000002.00000001.sdmpBinary or memory string: originalfilename vs CONTRACT.exe
        Source: CONTRACT.exe, 00000000.00000002.331227731.0000000007500000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs CONTRACT.exe
        Source: CONTRACT.exe, 00000000.00000002.331511150.0000000007640000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs CONTRACT.exe
        Source: CONTRACT.exe, 00000000.00000002.328078636.0000000005930000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWindowsNetwork.dll> vs CONTRACT.exe
        Source: CONTRACT.exe, 00000000.00000002.331081001.00000000074A0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs CONTRACT.exe
        Source: CONTRACT.exe, 0000000F.00000000.319310047.0000000000710000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamep6FirY.exeR vs CONTRACT.exe
        Source: CONTRACT.exe, 0000000F.00000002.507246807.0000000005330000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs CONTRACT.exe
        Source: CONTRACT.exe, 0000000F.00000002.506876489.0000000004FF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs CONTRACT.exe
        Source: CONTRACT.exe, 0000000F.00000002.501147747.0000000000D2A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs CONTRACT.exe
        Source: CONTRACT.exe, 0000000F.00000002.508210268.00000000063D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs CONTRACT.exe
        Source: CONTRACT.exe, 0000000F.00000002.507690875.0000000005B10000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs CONTRACT.exe
        Source: CONTRACT.exe, 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs CONTRACT.exe
        Source: CONTRACT.exe, 0000000F.00000002.507447877.0000000005710000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs CONTRACT.exe
        Source: CONTRACT.exe, 00000012.00000002.417606505.0000000006F50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs CONTRACT.exe
        Source: CONTRACT.exe, 00000012.00000002.418463825.0000000007270000.00000002.00000001.sdmpBinary or memory string: originalfilename vs CONTRACT.exe
        Source: CONTRACT.exe, 00000012.00000002.418463825.0000000007270000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs CONTRACT.exe
        Source: CONTRACT.exe, 00000012.00000000.327386760.0000000000FA0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamep6FirY.exeR vs CONTRACT.exe
        Source: CONTRACT.exe, 00000012.00000002.412946319.00000000039A3000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWindowsNetwork.dll> vs CONTRACT.exe
        Source: CONTRACT.exe, 00000012.00000002.418259595.0000000007210000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs CONTRACT.exe
        Source: CONTRACT.exe, 00000012.00000002.416976159.0000000006C60000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs CONTRACT.exe
        Source: CONTRACT.exe, 0000001A.00000002.405851211.00000000004B0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamep6FirY.exeR vs CONTRACT.exe
        Source: CONTRACT.exe, 0000001C.00000002.424334425.00000000005B0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamep6FirY.exeR vs CONTRACT.exe
        Source: CONTRACT.exe, 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs CONTRACT.exe
        Source: CONTRACT.exe, 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs CONTRACT.exe
        Source: CONTRACT.exe, 0000001C.00000002.424932741.0000000000CBA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs CONTRACT.exe
        Source: CONTRACT.exe, 0000001C.00000002.425626395.0000000003CA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs CONTRACT.exe
        Source: CONTRACT.exe, 0000001C.00000002.425752443.0000000004DD0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs CONTRACT.exe
        Source: CONTRACT.exeBinary or memory string: OriginalFilenamep6FirY.exeR vs CONTRACT.exe
        Source: CONTRACT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.507246807.0000000005330000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.507246807.0000000005330000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.425626395.0000000003CA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: CONTRACT.exe PID: 6168, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: CONTRACT.exe PID: 6168, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: CONTRACT.exe PID: 1388, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: CONTRACT.exe PID: 1388, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.CONTRACT.exe.3ce9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.CONTRACT.exe.3ce9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.CONTRACT.exe.3ce9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.CONTRACT.exe.5330000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.5330000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.CONTRACT.exe.5b24629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.5b24629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.CONTRACT.exe.3deeb0c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.3deeb0c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.CONTRACT.exe.da294b8.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.CONTRACT.exe.da294b8.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.CONTRACT.exe.da294b8.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.CONTRACT.exe.2cc38ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.CONTRACT.exe.2cc38ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.CONTRACT.exe.3cf3135.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.CONTRACT.exe.3cf3135.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.CONTRACT.exe.3de9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.3de9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.CONTRACT.exe.3de9cd6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.CONTRACT.exe.5b20000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.5b20000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.CONTRACT.exe.da294b8.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.CONTRACT.exe.da294b8.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.CONTRACT.exe.da294b8.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.CONTRACT.exe.3deeb0c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.3deeb0c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.CONTRACT.exe.5b20000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.5b20000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.CONTRACT.exe.3ceeb0c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.CONTRACT.exe.3ceeb0c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.CONTRACT.exe.3ceeb0c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.CONTRACT.exe.3ceeb0c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.CONTRACT.exe.46be418.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.CONTRACT.exe.46be418.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.CONTRACT.exe.46be418.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.CONTRACT.exe.46be418.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.CONTRACT.exe.46be418.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.CONTRACT.exe.46be418.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.CONTRACT.exe.3df3135.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.3df3135.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.CONTRACT.exe.2db12f4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.CONTRACT.exe.2db12f4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.CONTRACT.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 15.2.CONTRACT.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 15.2.CONTRACT.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 15.0.CONTRACT.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 15.0.CONTRACT.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 15.0.CONTRACT.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 15.0.CONTRACT.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 15.0.CONTRACT.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 15.0.CONTRACT.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 15.0.CONTRACT.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 15.0.CONTRACT.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 15.2.CONTRACT.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 15.2.CONTRACT.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 28.0.CONTRACT.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 28.0.CONTRACT.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 15.0.CONTRACT.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 15.0.CONTRACT.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 28.0.CONTRACT.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 28.0.CONTRACT.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 28.2.CONTRACT.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 28.2.CONTRACT.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: classification engineClassification label: mal100.troj.evad.winEXE@17/7@17/1
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_050412EA AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_050412B3 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05C319CE AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05C31997 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\CONTRACT.exeFile created: C:\Users\user\AppData\Roaming\QnctWeFrWlqq.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4740:120:WilError_01
        Source: C:\Users\user\Desktop\CONTRACT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\CONTRACT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{30b6fbac-dd0d-47bd-b8ab-6df66b017896}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6236:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_01
        Source: C:\Users\user\Desktop\CONTRACT.exeFile created: C:\Users\user\AppData\Local\Temp\tmp99D6.tmpJump to behavior
        Source: CONTRACT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\CONTRACT.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\CONTRACT.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\CONTRACT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: CONTRACT.exeReversingLabs: Detection: 36%
        Source: C:\Users\user\Desktop\CONTRACT.exeFile read: C:\Users\user\Desktop\CONTRACT.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\CONTRACT.exe 'C:\Users\user\Desktop\CONTRACT.exe'
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp99D6.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Users\user\Desktop\CONTRACT.exe {path}
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA9F3.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\CONTRACT.exe C:\Users\user\Desktop\CONTRACT.exe 0
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp372F.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Users\user\Desktop\CONTRACT.exe {path}
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Users\user\Desktop\CONTRACT.exe {path}
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp99D6.tmp'
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Users\user\Desktop\CONTRACT.exe {path}
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA9F3.tmp'
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp372F.tmp'
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Users\user\Desktop\CONTRACT.exe {path}
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Users\user\Desktop\CONTRACT.exe {path}
        Source: C:\Users\user\Desktop\CONTRACT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\CONTRACT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: CONTRACT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\CONTRACT.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: CONTRACT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: CONTRACT.exe, 00000000.00000002.331511150.0000000007640000.00000002.00000001.sdmp, CONTRACT.exe, 0000000F.00000002.507447877.0000000005710000.00000002.00000001.sdmp, CONTRACT.exe, 00000012.00000002.416976159.0000000006C60000.00000002.00000001.sdmp
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_00D78794 push 28700002h; retn 0000h
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_00D77076 push ebp; iretd
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 0_2_03202D94 push dword ptr [ecx]; retf
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_00617076 push ebp; iretd
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_00618794 push 28700002h; retn 0000h
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_00CE74AC push ecx; ret
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_00CE74B8 push ebp; ret
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_00CE9D58 pushad ; retf
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_00CE9D54 push eax; retf
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_00EA8794 push 28700002h; retn 0000h
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_00EA7076 push ebp; iretd
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 18_2_05772D94 push dword ptr [ecx]; retf
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 26_2_003B7076 push ebp; iretd
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 26_2_003B8794 push 28700002h; retn 0000h
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 28_2_004B7076 push ebp; iretd
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 28_2_004B8794 push 28700002h; retn 0000h
        Source: initial sampleStatic PE information: section name: .text entropy: 7.29376967447
        Source: initial sampleStatic PE information: section name: .text entropy: 7.29376967447
        Source: 15.2.CONTRACT.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 15.2.CONTRACT.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 15.0.CONTRACT.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 15.0.CONTRACT.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 15.0.CONTRACT.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 15.0.CONTRACT.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 28.0.CONTRACT.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 28.0.CONTRACT.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 28.0.CONTRACT.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 28.0.CONTRACT.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 28.2.CONTRACT.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 28.2.CONTRACT.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\CONTRACT.exeFile created: C:\Users\user\AppData\Roaming\QnctWeFrWlqq.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp99D6.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\CONTRACT.exeFile opened: C:\Users\user\Desktop\CONTRACT.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 4600, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 6344, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: CONTRACT.exe, 00000000.00000002.323016759.00000000036B1000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: CONTRACT.exe, 00000000.00000002.323016759.00000000036B1000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\CONTRACT.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\CONTRACT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\CONTRACT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\CONTRACT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\CONTRACT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\CONTRACT.exeWindow / User API: foregroundWindowGot 708
        Source: C:\Users\user\Desktop\CONTRACT.exe TID: 6376Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\CONTRACT.exe TID: 3596Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\CONTRACT.exe TID: 3596Thread sleep count: 132 > 30
        Source: C:\Users\user\Desktop\CONTRACT.exe TID: 3596Thread sleep count: 210 > 30
        Source: C:\Users\user\Desktop\CONTRACT.exe TID: 4532Thread sleep count: 143 > 30
        Source: C:\Users\user\Desktop\CONTRACT.exe TID: 5804Thread sleep time: -300000s >= -30000s
        Source: C:\Users\user\Desktop\CONTRACT.exe TID: 4696Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\CONTRACT.exe TID: 7152Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_05041012 GetSystemInfo,
        Source: C:\Users\user\Desktop\CONTRACT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\CONTRACT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\CONTRACT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\CONTRACT.exeThread delayed: delay time: 922337203685477
        Source: CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: CONTRACT.exe, 0000000F.00000002.508210268.00000000063D0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: CONTRACT.exe, 0000000F.00000002.501442796.0000000000DAD000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
        Source: CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: CONTRACT.exe, 0000000F.00000002.508210268.00000000063D0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: CONTRACT.exe, 0000000F.00000002.508210268.00000000063D0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: CONTRACT.exe, 00000012.00000002.412160555.00000000035F3000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: CONTRACT.exe, 0000000F.00000002.501442796.0000000000DAD000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: CONTRACT.exe, 0000000F.00000002.508210268.00000000063D0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\CONTRACT.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\CONTRACT.exeMemory written: C:\Users\user\Desktop\CONTRACT.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\CONTRACT.exeMemory written: C:\Users\user\Desktop\CONTRACT.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp99D6.tmp'
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Users\user\Desktop\CONTRACT.exe {path}
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA9F3.tmp'
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp372F.tmp'
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Users\user\Desktop\CONTRACT.exe {path}
        Source: C:\Users\user\Desktop\CONTRACT.exeProcess created: C:\Users\user\Desktop\CONTRACT.exe {path}
        Source: CONTRACT.exe, 0000000F.00000002.501442796.0000000000DAD000.00000004.00000020.sdmpBinary or memory string: Program Manager
        Source: CONTRACT.exe, 0000000F.00000002.502050466.0000000001470000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: CONTRACT.exe, 0000000F.00000002.502050466.0000000001470000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: CONTRACT.exe, 0000000F.00000002.502050466.0000000001470000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
        Source: CONTRACT.exe, 0000000F.00000002.501356514.0000000000D99000.00000004.00000020.sdmpBinary or memory string: sProgram ManagerD[
        Source: CONTRACT.exe, 0000000F.00000002.502050466.0000000001470000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
        Source: CONTRACT.exe, 0000000F.00000002.502050466.0000000001470000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: CONTRACT.exe, 0000000F.00000002.505011573.0000000002E5C000.00000004.00000001.sdmpBinary or memory string: Program Manager8V
        Source: CONTRACT.exe, 0000000F.00000002.501442796.0000000000DAD000.00000004.00000020.sdmpBinary or memory string: Program Manager\
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\CONTRACT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425626395.0000000003CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 6168, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 1388, type: MEMORY
        Source: Yara matchFile source: 28.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ce9cd6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b24629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3deeb0c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CONTRACT.exe.da294b8.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3cf3135.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3de9cd6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b20000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CONTRACT.exe.da294b8.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3deeb0c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b20000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ceeb0c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ceeb0c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.CONTRACT.exe.46be418.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.CONTRACT.exe.46be418.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3df3135.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: CONTRACT.exe, 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: CONTRACT.exe, 0000000F.00000002.507246807.0000000005330000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: CONTRACT.exe, 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: CONTRACT.exe, 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425626395.0000000003CA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 6168, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CONTRACT.exe PID: 1388, type: MEMORY
        Source: Yara matchFile source: 28.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ce9cd6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b24629.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3deeb0c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CONTRACT.exe.da294b8.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3cf3135.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3de9cd6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.0.CONTRACT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b20000.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.CONTRACT.exe.da294b8.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.0.CONTRACT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3deeb0c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.5b20000.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ceeb0c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.3ceeb0c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.CONTRACT.exe.46be418.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.CONTRACT.exe.46be418.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.CONTRACT.exe.3df3135.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.CONTRACT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_0504283A bind,
        Source: C:\Users\user\Desktop\CONTRACT.exeCode function: 15_2_050427E8 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading1Input Capture21Security Software Discovery211Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery13VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information2Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing2/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 431926 Sample: CONTRACT.exe Startdate: 09/06/2021 Architecture: WINDOWS Score: 100 44 kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu 2->44 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Multi AV Scanner detection for dropped file 2->54 56 9 other signatures 2->56 9 CONTRACT.exe 6 2->9         started        13 CONTRACT.exe 4 2->13         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\QnctWeFrWlqq.exe, PE32 9->38 dropped 40 C:\Users\user\AppData\Local\...\tmp99D6.tmp, XML 9->40 dropped 42 C:\Users\user\AppData\...\CONTRACT.exe.log, ASCII 9->42 dropped 58 Uses schtasks.exe or at.exe to add and modify task schedules 9->58 60 Injects a PE file into a foreign processes 9->60 15 CONTRACT.exe 10 9->15         started        20 schtasks.exe 1 9->20         started        22 schtasks.exe 1 13->22         started        24 CONTRACT.exe 2 13->24         started        26 CONTRACT.exe 13->26         started        signatures6 process7 dnsIp8 46 kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu 185.140.53.135, 1187, 49713, 49714 DAVID_CRAIGGG Sweden 15->46 36 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 15->36 dropped 48 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->48 28 schtasks.exe 1 15->28         started        30 conhost.exe 20->30         started        32 conhost.exe 22->32         started        file9 signatures10 process11 process12 34 conhost.exe 28->34         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        CONTRACT.exe36%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        CONTRACT.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\QnctWeFrWlqq.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\QnctWeFrWlqq.exe36%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        15.2.CONTRACT.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        28.0.CONTRACT.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        15.0.CONTRACT.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        15.2.CONTRACT.exe.5b20000.11.unpack100%AviraTR/NanoCore.fadteDownload File
        15.0.CONTRACT.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        28.0.CONTRACT.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        28.2.CONTRACT.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.sandoll.co.krl0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.fontbureau.comion0%URL Reputationsafe
        http://www.fontbureau.comion0%URL Reputationsafe
        http://www.fontbureau.comion0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.come.com0%URL Reputationsafe
        http://www.fontbureau.come.com0%URL Reputationsafe
        http://www.fontbureau.come.com0%URL Reputationsafe
        http://www.tiro.comnm0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y0z0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn10%Avira URL Cloudsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cnl-g0%Avira URL Cloudsafe
        http://www.tiro.comcm0%Avira URL Cloudsafe
        kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu0%Avira URL Cloudsafe
        http://www.fontbureau.comm0%URL Reputationsafe
        http://www.fontbureau.comm0%URL Reputationsafe
        http://www.fontbureau.comm0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/ita0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/Qg30%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.fonts.com80%URL Reputationsafe
        http://www.fonts.com80%URL Reputationsafe
        http://www.fonts.com80%URL Reputationsafe
        http://www.founder.com.cn/cnPq0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Cg0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        api.globalsign.cloud
        104.18.24.243
        truefalse
          unknown
          kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu
          185.140.53.135
          truetrue
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            true
            • Avira URL Cloud: safe
            low
            kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eutrue
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
              high
              http://www.fontbureau.comCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designersGCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                      high
                      http://www.sandoll.co.krlCONTRACT.exe, 00000000.00000003.233856245.0000000005A76000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comCONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comionCONTRACT.exe, 00000000.00000003.319401814.0000000005A70000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersCONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                        high
                        http://www.goodfont.co.krCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comCONTRACT.exe, 00000000.00000003.235560856.0000000005A80000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/jp/CONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comaCONTRACT.exe, 00000000.00000003.319401814.0000000005A70000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.come.comCONTRACT.exe, 00000000.00000003.319401814.0000000005A70000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.tiro.comnmCONTRACT.exe, 00000000.00000003.232943546.0000000005A8B000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/Y0zCONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.carterandcone.comlCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comCONTRACT.exe, 00000000.00000003.232678625.0000000005A8B000.00000004.00000001.sdmp, CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/CONTRACT.exe, 00000000.00000003.235175021.0000000005A74000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn1CONTRACT.exe, 00000000.00000003.234859930.0000000005A74000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000000.00000003.234802969.0000000005AAD000.00000004.00000001.sdmp, CONTRACT.exe, 00000000.00000003.235175021.0000000005A74000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnl-gCONTRACT.exe, 00000000.00000003.234802969.0000000005AAD000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                            high
                            http://www.tiro.comcmCONTRACT.exe, 00000000.00000003.232884277.0000000005A8B000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.commCONTRACT.exe, 00000000.00000003.319401814.0000000005A70000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/itaCONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/nCONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersbCONTRACT.exe, 00000000.00000003.238068775.0000000005A7D000.00000004.00000001.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/jp/Qg3CONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8CONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                                high
                                http://www.fonts.comCONTRACT.exe, 00000000.00000003.232678625.0000000005A8B000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.sandoll.co.krCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sakkal.comCONTRACT.exe, 00000000.00000002.330280391.0000000006C82000.00000004.00000001.sdmp, CONTRACT.exe, 00000012.00000002.415953147.0000000005C60000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fonts.com8CONTRACT.exe, 00000000.00000003.232678625.0000000005A8B000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnPqCONTRACT.exe, 00000000.00000003.234859930.0000000005A74000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/CgCONTRACT.exe, 00000000.00000003.236218871.0000000005A74000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  185.140.53.135
                                  kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euSweden
                                  209623DAVID_CRAIGGGtrue

                                  General Information

                                  Joe Sandbox Version:32.0.0 Black Diamond
                                  Analysis ID:431926
                                  Start date:09.06.2021
                                  Start time:15:09:58
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 11m 33s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:CONTRACT.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:33
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@17/7@17/1
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 13.7% (good quality ratio 9.5%)
                                  • Quality average: 46.7%
                                  • Quality standard deviation: 34.4%
                                  HCA Information:
                                  • Successful, ratio: 97%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .exe
                                  Warnings:
                                  Show All
                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                  • TCP Packets have been reduced to 100
                                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 92.122.145.220, 40.88.32.150, 184.30.20.56, 20.82.210.154, 13.88.21.125, 20.190.160.68, 20.190.160.3, 20.190.160.131, 20.190.160.72, 20.190.160.135, 20.190.160.70, 20.190.160.1, 20.190.160.7, 92.122.213.194, 92.122.213.247, 104.43.139.144, 20.54.26.129, 52.255.188.83
                                  • Excluded domains from analysis (whitelisted): ocsp.msocsp.com, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, www.tm.a.prd.aadg.trafficmanager.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, login.live.com, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, login.msa.msidentity.com, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, hostedocsp.globalsign.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: /opt/package/joesandbox/database/analysis/431926/sample/CONTRACT.exe

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  15:11:34API Interceptor671x Sleep call for process: CONTRACT.exe modified
                                  15:11:35Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\CONTRACT.exe" s>$(Arg0)

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  185.140.53.135Swift.exeGet hashmaliciousBrowse
                                    5U8Z6pqTlhp68RB.exeGet hashmaliciousBrowse
                                      HY_RAY_RFQ,pdf .exeGet hashmaliciousBrowse
                                        Shipping_Documents_INV_PL_and_BL,pdf.exeGet hashmaliciousBrowse
                                          Geno_Quotation,pdf.exeGet hashmaliciousBrowse
                                            PO20002106.exeGet hashmaliciousBrowse
                                              SOA_30_11_2020,pdf.exeGet hashmaliciousBrowse
                                                20201229_QUA_20Y0252,pdf.exeGet hashmaliciousBrowse
                                                  PO029734,pdf.exeGet hashmaliciousBrowse
                                                    VSI_202012223,pdf.exeGet hashmaliciousBrowse
                                                      PO968_8359808,pdf.exeGet hashmaliciousBrowse
                                                        purchase order # 10000000648.pdf.exeGet hashmaliciousBrowse
                                                          Order 20015639 15-10-2020,pdf.exeGet hashmaliciousBrowse
                                                            shipping documents.docGet hashmaliciousBrowse
                                                              POEA-MANNING ADVISORY 2020-56.PDF.exeGet hashmaliciousBrowse
                                                                Doc_1110_090820.exeGet hashmaliciousBrowse
                                                                  Doc0_01210_72820.exeGet hashmaliciousBrowse

                                                                    Domains

                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euSwift.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.135
                                                                    5U8Z6pqTlhp68RB.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.135
                                                                    api.globalsign.cloudMO1cjFKh2H.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    nU8kVKVAc8.exeGet hashmaliciousBrowse
                                                                    • 104.18.25.243
                                                                    25-1.exeGet hashmaliciousBrowse
                                                                    • 104.18.25.243
                                                                    4ySmTH2Z18.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    EQUIPMENT SPECIFICATION.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    FLkiItoJYT.exeGet hashmaliciousBrowse
                                                                    • 104.18.25.243
                                                                    2sEHG8pTHtJcOxy.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    RFQ039311.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    RFQ.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    receipt620.htmGet hashmaliciousBrowse
                                                                    • 104.18.25.243
                                                                    RFQ PRICE LIST FOR LEABANON 8938920993.exeGet hashmaliciousBrowse
                                                                    • 104.18.25.243
                                                                    Haftal#U0131k Piyasa G#U00f6r#U00fc#U015f#U00fc ve Fon Da#U011f#U0131l#U0131m #U00d6nerileri.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    SecuriteInfo.com.W32.AIDetect.malware2.23636.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    purchase order.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    TJ8I2tNHFHvbwdf.exeGet hashmaliciousBrowse
                                                                    • 104.18.25.243
                                                                    CONTRACT_SCAN627289222.exeGet hashmaliciousBrowse
                                                                    • 104.18.25.243
                                                                    Drawings-ESS316.exeGet hashmaliciousBrowse
                                                                    • 104.18.25.243
                                                                    rf1K94mmmC.exeGet hashmaliciousBrowse
                                                                    • 104.18.25.243
                                                                    Fattura01409602.xlsmGet hashmaliciousBrowse
                                                                    • 104.18.24.243
                                                                    UR8zlHNhnw.exeGet hashmaliciousBrowse
                                                                    • 104.18.24.243

                                                                    ASN

                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    DAVID_CRAIGGGdoc03027320210521173305IMG0012.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.230
                                                                    yfilQwrYpA.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.216
                                                                    Ff6m4N8pog.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.216
                                                                    yCdBrRiAN2.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.216
                                                                    loKHQzx6Lf.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.216
                                                                    SecuriteInfo.com.Program.Win32.Wacapew.Cml.7225.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.129
                                                                    Shipping Documents_Bill of Lading 910571880.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.129
                                                                    knqh5Hw6gu.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.13
                                                                    Container_Deposit_slip_pdf.jarGet hashmaliciousBrowse
                                                                    • 185.244.30.47
                                                                    Cargo Charter Request details.vbsGet hashmaliciousBrowse
                                                                    • 185.244.30.184
                                                                    Shipping Documents_Bill of Lading 910571880,pdf.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.129
                                                                    WarkZh7G8j6Xo8r.exeGet hashmaliciousBrowse
                                                                    • 91.193.75.66
                                                                    Re R new proforma.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.138
                                                                    PO20880538.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.129
                                                                    QI5MR3pte0.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.40
                                                                    5Em2NXNxSt.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.40
                                                                    7Zpsd899Kf.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.40
                                                                    LfgEatrwIF.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.40
                                                                    Swift.exeGet hashmaliciousBrowse
                                                                    • 185.140.53.135
                                                                    50060001-SDS-MAT.docGet hashmaliciousBrowse
                                                                    • 185.140.53.149

                                                                    JA3 Fingerprints

                                                                    No context

                                                                    Dropped Files

                                                                    No context

                                                                    Created / dropped Files

                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\CONTRACT.exe.log
                                                                    Process:C:\Users\user\Desktop\CONTRACT.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):525
                                                                    Entropy (8bit):5.2874233355119316
                                                                    Encrypted:false
                                                                    SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                                    MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                                    SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                                    SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                                    SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                                    Malicious:true
                                                                    Reputation:high, very likely benign file
                                                                    Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                                    C:\Users\user\AppData\Local\Temp\tmp372F.tmp
                                                                    Process:C:\Users\user\Desktop\CONTRACT.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1649
                                                                    Entropy (8bit):5.1758026207295185
                                                                    Encrypted:false
                                                                    SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBWtn:cbhC7ZlNQF/rydbz9I3YODOLNdq3u
                                                                    MD5:079FD1EAE59C41272B433990C9FE9362
                                                                    SHA1:8174889EC1A3B212D32B07674D2AF7277FAF3C36
                                                                    SHA-256:E7338DDD51F1164DD1D8EAAAA577AFF2D4CEED3E7E878977ED7810EE7FD272BB
                                                                    SHA-512:778D6CB22DF42C21A226696BC1DDB40D0EAFDB6E687F311FC8BBE876EBB5584016325AC03BB537A29F151E4FCBB8546943E6BBC34F1514F8BD195432C5267E0A
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                    C:\Users\user\AppData\Local\Temp\tmp99D6.tmp
                                                                    Process:C:\Users\user\Desktop\CONTRACT.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1649
                                                                    Entropy (8bit):5.1758026207295185
                                                                    Encrypted:false
                                                                    SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBWtn:cbhC7ZlNQF/rydbz9I3YODOLNdq3u
                                                                    MD5:079FD1EAE59C41272B433990C9FE9362
                                                                    SHA1:8174889EC1A3B212D32B07674D2AF7277FAF3C36
                                                                    SHA-256:E7338DDD51F1164DD1D8EAAAA577AFF2D4CEED3E7E878977ED7810EE7FD272BB
                                                                    SHA-512:778D6CB22DF42C21A226696BC1DDB40D0EAFDB6E687F311FC8BBE876EBB5584016325AC03BB537A29F151E4FCBB8546943E6BBC34F1514F8BD195432C5267E0A
                                                                    Malicious:true
                                                                    Reputation:low
                                                                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                    C:\Users\user\AppData\Local\Temp\tmpA9F3.tmp
                                                                    Process:C:\Users\user\Desktop\CONTRACT.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1299
                                                                    Entropy (8bit):5.099430969810765
                                                                    Encrypted:false
                                                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Pwxtn:cbk4oL600QydbQxIYODOLedq3Swj
                                                                    MD5:3D40480D97364F56C5C51E071E631CCA
                                                                    SHA1:E13D848FFA6CC8296CE19F5D3D6018AC500AB54E
                                                                    SHA-256:FEBB7C115CF69F8959CF4F0B5BD15FC3AF198E93F7ED32937DBCD2B8D1086B99
                                                                    SHA-512:52597FDB8A0292F068D5A7A2EC1D221FCCC730DDD31EF25C05ACB3464A2E05B7BBD8298B9A9A0A6ABB0A8C3C0069DB81A512F9DA25C970FBABC2AF894B95BC04
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                    Process:C:\Users\user\Desktop\CONTRACT.exe
                                                                    File Type:Non-ISO extended-ASCII text, with NEL line terminators
                                                                    Category:dropped
                                                                    Size (bytes):8
                                                                    Entropy (8bit):3.0
                                                                    Encrypted:false
                                                                    SSDEEP:3:muhn:Nn
                                                                    MD5:B75FA3BA49F18EFFCA05BC26EFC182E4
                                                                    SHA1:170FAB6DBDBBD728DB71E9DFA17A74CFDBB80E18
                                                                    SHA-256:25EBD16688D06225015F798E1ED5801A7DF0D12E9587A5B4421C3B7563514189
                                                                    SHA-512:70B3D081FAA9583763D480AB263D127F5B68A2CAD280518C0EADD129EE64FAAC44D6A72DB0EFED2AD652EC527E58032E23AB7943663A5C477EF28B90D4F8B056
                                                                    Malicious:true
                                                                    Preview: ..}..+.H
                                                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                    Process:C:\Users\user\Desktop\CONTRACT.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):36
                                                                    Entropy (8bit):4.260067015271104
                                                                    Encrypted:false
                                                                    SSDEEP:3:oNUWJRWm+H:oNNJAm+H
                                                                    MD5:DBCC846B014C265EDEF56251371453F9
                                                                    SHA1:9C5B51D9F562B065CDBFC598D46A2757BE06BDD5
                                                                    SHA-256:82DDF51FD8DAEA1C6A369F221EDEB9EA74FC17C3DDC03F8C6DD7B3DCCCFD1CC7
                                                                    SHA-512:D876C8EDB8E6C7A47F6BD39C997F23B817EBF1E2F2C671119880C7840E6DFE8E77A35AD7325836CE4C1830F655D4E336CD2A2CBBAA6760351EE390C915AD845B
                                                                    Malicious:false
                                                                    Preview: C:\Users\user\Desktop\CONTRACT.exe
                                                                    C:\Users\user\AppData\Roaming\QnctWeFrWlqq.exe
                                                                    Process:C:\Users\user\Desktop\CONTRACT.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1038848
                                                                    Entropy (8bit):7.288848117566979
                                                                    Encrypted:false
                                                                    SSDEEP:12288:Rp7kPTkSKoCyFABtnt/u7At0mGCMDXuFbCNbV89+7j2hjTQJpOVi26R8GOYZNh54:PIYo9A1Bt8jzuFbCNbq+YI8Gjn
                                                                    MD5:02430D34BE900990FBF6A7EFE35A7C64
                                                                    SHA1:00B40170C46AE026CF518588D5B6177538BB1036
                                                                    SHA-256:80CA460C629559CF38E1244983877ED9C041C636C1F2E7E388AE2F9BA4D06788
                                                                    SHA-512:5B8D6D1F57D3B7E6E38171A493DEA7723F59A11E5F96C3121B4A171D9B3CA50BEAF8A57FE55FB6E1BA5DCD3AA06F5226C91E9E89422354B987EE4451BB466467
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 36%
                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-Z.`..............0.................. ........@.. .......................@............@.....................................S............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H........F.........c........X...........................................0..........*....0..f........r...p}......}.....(.... ... .$'.a%..^E...."...............+ .. ...RZ .T.a+... ...Z ...6a+..(.....*...0........... YX$. ...ea%....^E....B.......................#...........G.......q...................8=.....-. mO..%+. ....%&.. ....Za+..{....(....r[..p(....+.... b.$W8h....{....(....r[..p(....-... J.c.Z 9c..a8>....r]..p(....&.. w../Z ..t.a8.....{....(....r[..p(....-... ..AZ @

                                                                    Static File Info

                                                                    General

                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):7.288848117566979
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                    File name:CONTRACT.exe
                                                                    File size:1038848
                                                                    MD5:02430d34be900990fbf6a7efe35a7c64
                                                                    SHA1:00b40170c46ae026cf518588d5b6177538bb1036
                                                                    SHA256:80ca460c629559cf38e1244983877ed9c041c636c1f2e7e388ae2f9ba4d06788
                                                                    SHA512:5b8d6d1f57d3b7e6e38171a493dea7723f59a11e5f96c3121b4a171d9b3ca50beaf8a57fe55fb6e1ba5dcd3aa06f5226c91e9e89422354b987ee4451bb466467
                                                                    SSDEEP:12288:Rp7kPTkSKoCyFABtnt/u7At0mGCMDXuFbCNbV89+7j2hjTQJpOVi26R8GOYZNh54:PIYo9A1Bt8jzuFbCNbq+YI8Gjn
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-Z.`..............0.................. ........@.. .......................@............@................................

                                                                    File Icon

                                                                    Icon Hash:00828e8e8686b000

                                                                    Static PE Info

                                                                    General

                                                                    Entrypoint:0x4feede
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                    Time Stamp:0x60C05A2D [Wed Jun 9 06:05:33 2021 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:v2.0.50727
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                    Entrypoint Preview

                                                                    Instruction
                                                                    jmp dword ptr [00402000h]
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al

                                                                    Data Directories

                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xfee880x53.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1000000x5e0.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1020000xc.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                    Sections

                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x20000xfcee40xfd000False0.609683794466data7.29376967447IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0x1000000x5e00x600False0.429036458333data4.17054411618IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0x1020000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                    Resources

                                                                    NameRVASizeTypeLanguageCountry
                                                                    RT_VERSION0x1000a00x354data
                                                                    RT_MANIFEST0x1003f40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                    Imports

                                                                    DLLImport
                                                                    mscoree.dll_CorExeMain

                                                                    Version Infos

                                                                    DescriptionData
                                                                    Translation0x0000 0x04b0
                                                                    LegalCopyrightCopyright 2019
                                                                    Assembly Version1.0.0.0
                                                                    InternalNamep6FirY.exe
                                                                    FileVersion1.0.0.0
                                                                    CompanyName
                                                                    LegalTrademarks
                                                                    Comments
                                                                    ProductNameWindowsFormsApplication1
                                                                    ProductVersion1.0.0.0
                                                                    FileDescriptionWindowsFormsApplication1
                                                                    OriginalFilenamep6FirY.exe

                                                                    Network Behavior

                                                                    Network Port Distribution

                                                                    TCP Packets

                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jun 9, 2021 15:11:36.133652925 CEST497131187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:36.184017897 CEST118749713185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:36.832331896 CEST497131187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:36.884536982 CEST118749713185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:37.512537956 CEST497131187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:37.562122107 CEST118749713185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:41.910310984 CEST497141187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:41.959913015 CEST118749714185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:42.473571062 CEST497141187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:42.522758007 CEST118749714185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:43.035938978 CEST497141187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:43.086430073 CEST118749714185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:47.266108990 CEST497161187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:47.315263033 CEST118749716185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:47.895875931 CEST497161187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:47.945034981 CEST118749716185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:48.598984003 CEST497161187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:48.648087978 CEST118749716185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:52.833493948 CEST497201187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:52.884505987 CEST118749720185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:53.396202087 CEST497201187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:53.446635008 CEST118749720185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:54.099448919 CEST497201187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:54.150813103 CEST118749720185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:58.305289984 CEST497251187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:58.355926991 CEST118749725185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:58.912319899 CEST497251187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:58.961363077 CEST118749725185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:11:59.594679117 CEST497251187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:11:59.643789053 CEST118749725185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:04.344858885 CEST497261187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:04.394035101 CEST118749726185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:04.897331953 CEST497261187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:04.946528912 CEST118749726185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:05.491000891 CEST497261187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:05.540112972 CEST118749726185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:09.970873117 CEST497311187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:10.020190954 CEST118749731185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:10.600840092 CEST497311187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:10.650640011 CEST118749731185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:11.210552931 CEST497311187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:11.260483980 CEST118749731185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:15.386992931 CEST497331187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:15.436425924 CEST118749733185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:15.945077896 CEST497331187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:15.994143963 CEST118749733185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:16.507870913 CEST497331187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:16.557605028 CEST118749733185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:20.748197079 CEST497341187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:20.799599886 CEST118749734185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:21.304902077 CEST497341187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:21.354278088 CEST118749734185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:21.867383003 CEST497341187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:21.916800976 CEST118749734185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:26.149667978 CEST497361187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:26.198642969 CEST118749736185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:26.711622000 CEST497361187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:26.760647058 CEST118749736185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:27.274167061 CEST497361187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:27.323299885 CEST118749736185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:31.524297953 CEST497381187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:31.576438904 CEST118749738185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:32.087162971 CEST497381187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:32.136506081 CEST118749738185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:32.649689913 CEST497381187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:32.699239016 CEST118749738185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:36.844011068 CEST497421187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:36.893429995 CEST118749742185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:37.400743961 CEST497421187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:37.450277090 CEST118749742185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:37.962666988 CEST497421187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:38.012227058 CEST118749742185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:42.129333973 CEST497431187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:42.178355932 CEST118749743185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:42.681971073 CEST497431187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:42.731220007 CEST118749743185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:43.244360924 CEST497431187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:43.294605970 CEST118749743185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:47.470359087 CEST497441187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:47.519824028 CEST118749744185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:48.025939941 CEST497441187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:48.075654984 CEST118749744185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:48.588541985 CEST497441187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:48.639895916 CEST118749744185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:52.910712004 CEST497451187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:52.960248947 CEST118749745185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:53.463908911 CEST497451187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:53.513602972 CEST118749745185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:54.026438951 CEST497451187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:54.076955080 CEST118749745185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:58.151308060 CEST497461187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:58.201324940 CEST118749746185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:58.714617014 CEST497461187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:58.765150070 CEST118749746185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:12:59.276935101 CEST497461187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:12:59.327738047 CEST118749746185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:13:03.393882036 CEST497471187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:13:03.443732023 CEST118749747185.140.53.135192.168.2.5
                                                                    Jun 9, 2021 15:13:03.949186087 CEST497471187192.168.2.5185.140.53.135
                                                                    Jun 9, 2021 15:13:03.998831987 CEST118749747185.140.53.135192.168.2.5

                                                                    UDP Packets

                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jun 9, 2021 15:10:43.247039080 CEST6180553192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:10:43.309325933 CEST53618058.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:10:46.349242926 CEST5479553192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:10:46.408559084 CEST53547958.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:10:54.344942093 CEST4955753192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:10:54.403634071 CEST53495578.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:07.206101894 CEST6173353192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:07.289447069 CEST53617338.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:09.357294083 CEST6544753192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:09.407288074 CEST53654478.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:18.258994102 CEST5244153192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:18.317873001 CEST53524418.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:20.861732960 CEST6217653192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:20.920252085 CEST53621768.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:22.370107889 CEST5959653192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:22.420223951 CEST53595968.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:35.948556900 CEST6529653192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:36.040786028 CEST53652968.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:41.824446917 CEST6318353192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:41.907804966 CEST53631838.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:44.029692888 CEST6015153192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:44.079866886 CEST53601518.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:47.160471916 CEST5696953192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:47.222385883 CEST53569698.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:48.347043991 CEST5516153192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:48.397419930 CEST53551618.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:50.412841082 CEST5475753192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:50.466154099 CEST53547578.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:52.513382912 CEST4999253192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:52.563604116 CEST53499928.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:52.722013950 CEST6007553192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:52.781090021 CEST53600758.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:54.455400944 CEST5501653192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:54.516119957 CEST53550168.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:55.904514074 CEST6434553192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:55.977710009 CEST53643458.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:11:58.242530107 CEST5712853192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:11:58.303719044 CEST53571288.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:04.242368937 CEST5479153192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:04.302180052 CEST53547918.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:09.044012070 CEST5046353192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:09.105695963 CEST53504638.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:09.909527063 CEST5039453192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:09.969455957 CEST53503948.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:12.994746923 CEST5853053192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:13.045157909 CEST53585308.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:15.322493076 CEST5381353192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:15.382190943 CEST53538138.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:20.654206991 CEST6373253192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:20.715926886 CEST53637328.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:26.032799959 CEST5734453192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:26.088777065 CEST5445053192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:26.105664968 CEST53573448.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:26.147627115 CEST53544508.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:27.186002970 CEST5926153192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:27.252074957 CEST53592618.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:31.461066961 CEST5715153192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:31.522952080 CEST53571518.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:33.924118042 CEST5941353192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:33.986242056 CEST53594138.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:35.132694960 CEST6051653192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:35.209789038 CEST53605168.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:35.285379887 CEST5164953192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:35.340759993 CEST53516498.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:36.766644001 CEST6508653192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:36.828108072 CEST53650868.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:42.067761898 CEST5643253192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:42.128058910 CEST53564328.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:47.410507917 CEST5292953192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:47.469122887 CEST53529298.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:52.854509115 CEST6431753192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:52.908962011 CEST53643178.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:12:58.090678930 CEST6100453192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:12:58.150679111 CEST53610048.8.8.8192.168.2.5
                                                                    Jun 9, 2021 15:13:03.341973066 CEST5689553192.168.2.58.8.8.8
                                                                    Jun 9, 2021 15:13:03.392714024 CEST53568958.8.8.8192.168.2.5

                                                                    DNS Queries

                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                    Jun 9, 2021 15:11:35.948556900 CEST192.168.2.58.8.8.80x6a79Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:11:41.824446917 CEST192.168.2.58.8.8.80x2e8Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:11:47.160471916 CEST192.168.2.58.8.8.80x8eb5Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:11:52.722013950 CEST192.168.2.58.8.8.80xb2abStandard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:11:58.242530107 CEST192.168.2.58.8.8.80xb66bStandard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:04.242368937 CEST192.168.2.58.8.8.80xdc24Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:09.909527063 CEST192.168.2.58.8.8.80x10c9Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:15.322493076 CEST192.168.2.58.8.8.80x7e01Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:20.654206991 CEST192.168.2.58.8.8.80x8746Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:26.088777065 CEST192.168.2.58.8.8.80x1bdaStandard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:31.461066961 CEST192.168.2.58.8.8.80xa7f8Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:36.766644001 CEST192.168.2.58.8.8.80x6d11Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:42.067761898 CEST192.168.2.58.8.8.80xd7a4Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:47.410507917 CEST192.168.2.58.8.8.80xe2e1Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:52.854509115 CEST192.168.2.58.8.8.80xf77bStandard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:58.090678930 CEST192.168.2.58.8.8.80xba42Standard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:13:03.341973066 CEST192.168.2.58.8.8.80x5f8eStandard query (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.euA (IP address)IN (0x0001)

                                                                    DNS Answers

                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                    Jun 9, 2021 15:10:43.309325933 CEST8.8.8.8192.168.2.50x918bNo error (0)api.globalsign.cloud104.18.24.243A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:10:43.309325933 CEST8.8.8.8192.168.2.50x918bNo error (0)api.globalsign.cloud104.18.25.243A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:11:36.040786028 CEST8.8.8.8192.168.2.50x6a79No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:11:41.907804966 CEST8.8.8.8192.168.2.50x2e8No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:11:47.222385883 CEST8.8.8.8192.168.2.50x8eb5No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:11:52.781090021 CEST8.8.8.8192.168.2.50xb2abNo error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:11:54.516119957 CEST8.8.8.8192.168.2.50xc3c3No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                                                    Jun 9, 2021 15:11:58.303719044 CEST8.8.8.8192.168.2.50xb66bNo error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:04.302180052 CEST8.8.8.8192.168.2.50xdc24No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:09.969455957 CEST8.8.8.8192.168.2.50x10c9No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:15.382190943 CEST8.8.8.8192.168.2.50x7e01No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:20.715926886 CEST8.8.8.8192.168.2.50x8746No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:26.147627115 CEST8.8.8.8192.168.2.50x1bdaNo error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:31.522952080 CEST8.8.8.8192.168.2.50xa7f8No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:36.828108072 CEST8.8.8.8192.168.2.50x6d11No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:42.128058910 CEST8.8.8.8192.168.2.50xd7a4No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:47.469122887 CEST8.8.8.8192.168.2.50xe2e1No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:52.908962011 CEST8.8.8.8192.168.2.50xf77bNo error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:12:58.150679111 CEST8.8.8.8192.168.2.50xba42No error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)
                                                                    Jun 9, 2021 15:13:03.392714024 CEST8.8.8.8192.168.2.50x5f8eNo error (0)kjjuigfdullygigyftkuyluylygilyfidyyuljhd.ydns.eu185.140.53.135A (IP address)IN (0x0001)

                                                                    Code Manipulations

                                                                    Statistics

                                                                    Behavior

                                                                    Click to jump to process

                                                                    System Behavior

                                                                    General

                                                                    Start time:15:10:50
                                                                    Start date:09/06/2021
                                                                    Path:C:\Users\user\Desktop\CONTRACT.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:'C:\Users\user\Desktop\CONTRACT.exe'
                                                                    Imagebase:0xd70000
                                                                    File size:1038848 bytes
                                                                    MD5 hash:02430D34BE900990FBF6A7EFE35A7C64
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.332389158.000000000D991000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.326212902.00000000046B1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    Reputation:low

                                                                    General

                                                                    Start time:15:11:30
                                                                    Start date:09/06/2021
                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp99D6.tmp'
                                                                    Imagebase:0xf60000
                                                                    File size:185856 bytes
                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    General

                                                                    Start time:15:11:30
                                                                    Start date:09/06/2021
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7ecfc0000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    General

                                                                    Start time:15:11:31
                                                                    Start date:09/06/2021
                                                                    Path:C:\Users\user\Desktop\CONTRACT.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:{path}
                                                                    Imagebase:0x610000
                                                                    File size:1038848 bytes
                                                                    MD5 hash:02430D34BE900990FBF6A7EFE35A7C64
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.318659568.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.507246807.0000000005330000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000F.00000002.507246807.0000000005330000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.499012397.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.319148029.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.507725412.0000000005B20000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.506181931.0000000003DE7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    Reputation:low

                                                                    General

                                                                    Start time:15:11:33
                                                                    Start date:09/06/2021
                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpA9F3.tmp'
                                                                    Imagebase:0xf60000
                                                                    File size:185856 bytes
                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    General

                                                                    Start time:15:11:33
                                                                    Start date:09/06/2021
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7ecfc0000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    General

                                                                    Start time:15:11:35
                                                                    Start date:09/06/2021
                                                                    Path:C:\Users\user\Desktop\CONTRACT.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Users\user\Desktop\CONTRACT.exe 0
                                                                    Imagebase:0xea0000
                                                                    File size:1038848 bytes
                                                                    MD5 hash:02430D34BE900990FBF6A7EFE35A7C64
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.413143915.00000000045C1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    Reputation:low

                                                                    General

                                                                    Start time:15:12:10
                                                                    Start date:09/06/2021
                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QnctWeFrWlqq' /XML 'C:\Users\user\AppData\Local\Temp\tmp372F.tmp'
                                                                    Imagebase:0x1360000
                                                                    File size:185856 bytes
                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    General

                                                                    Start time:15:12:10
                                                                    Start date:09/06/2021
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7ecfc0000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    General

                                                                    Start time:15:12:11
                                                                    Start date:09/06/2021
                                                                    Path:C:\Users\user\Desktop\CONTRACT.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:{path}
                                                                    Imagebase:0x3b0000
                                                                    File size:1038848 bytes
                                                                    MD5 hash:02430D34BE900990FBF6A7EFE35A7C64
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:low

                                                                    General

                                                                    Start time:15:12:12
                                                                    Start date:09/06/2021
                                                                    Path:C:\Users\user\Desktop\CONTRACT.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:{path}
                                                                    Imagebase:0x4b0000
                                                                    File size:1038848 bytes
                                                                    MD5 hash:02430D34BE900990FBF6A7EFE35A7C64
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000001C.00000000.407344258.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.425591629.0000000002CA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000001C.00000000.407937748.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.425626395.0000000003CA1000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.425626395.0000000003CA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.424133299.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    Reputation:low

                                                                    Disassembly

                                                                    Code Analysis

                                                                    Reset < >