Loading ...

Play interactive tourEdit tour

Analysis Report 7lQnHeq3XF

Overview

General Information

Sample Name:7lQnHeq3XF (renamed file extension from none to exe)
Analysis ID:432802
MD5:9750dee05b47f072e5975895dcf61ae5
SHA1:95f456ae508245b4c6891ad1c847227d0c012d90
SHA256:eea0f064af6e7b61e19ff9ade76eead562f5d3933d52c5cc7f2f5721d81b8c3d
Tags:exeNanoCoretrojan
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
.NET source code contains very large strings
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • 7lQnHeq3XF.exe (PID: 5360 cmdline: 'C:\Users\user\Desktop\7lQnHeq3XF.exe' MD5: 9750DEE05B47F072E5975895DCF61AE5)
    • schtasks.exe (PID: 3688 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp6F2E.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • 7lQnHeq3XF.exe (PID: 784 cmdline: {path} MD5: 9750DEE05B47F072E5975895DCF61AE5)
      • schtasks.exe (PID: 3032 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp8362.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • 7lQnHeq3XF.exe (PID: 3088 cmdline: C:\Users\user\Desktop\7lQnHeq3XF.exe 0 MD5: 9750DEE05B47F072E5975895DCF61AE5)
    • schtasks.exe (PID: 5336 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp1E69.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • 7lQnHeq3XF.exe (PID: 3508 cmdline: {path} MD5: 9750DEE05B47F072E5975895DCF61AE5)
    • 7lQnHeq3XF.exe (PID: 576 cmdline: {path} MD5: 9750DEE05B47F072E5975895DCF61AE5)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6ceec185-c99e-4d5c-8685-49487283", "Group": "Guage12", "Domain1": "185.136.169.24", "Domain2": "127.0.0.1", "Port": 54984, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x435b5:$a: NanoCore
    • 0x4360e:$a: NanoCore
    • 0x4364b:$a: NanoCore
    • 0x436c4:$a: NanoCore
    • 0x56d6f:$a: NanoCore
    • 0x56d84:$a: NanoCore
    • 0x56db9:$a: NanoCore
    • 0x6fd53:$a: NanoCore
    • 0x6fd68:$a: NanoCore
    • 0x6fd9d:$a: NanoCore
    • 0x43617:$b: ClientPlugin
    • 0x43654:$b: ClientPlugin
    • 0x43f52:$b: ClientPlugin
    • 0x43f5f:$b: ClientPlugin
    • 0x56b2b:$b: ClientPlugin
    • 0x56b46:$b: ClientPlugin
    • 0x56b76:$b: ClientPlugin
    • 0x56d8d:$b: ClientPlugin
    • 0x56dc2:$b: ClientPlugin
    • 0x6fb0f:$b: ClientPlugin
    • 0x6fb2a:$b: ClientPlugin
    0000000C.00000002.476199801.0000000003261000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x94ff5:$x1: NanoCore.ClientPluginHost
      • 0x95032:$x2: IClientNetworkHost
      • 0x98b65:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 52 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0x145e3:$x1: NanoCore.ClientPluginHost
        • 0x2d5c7:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        • 0x14610:$x2: IClientNetworkHost
        • 0x2d5f4:$x2: IClientNetworkHost
        24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x145e3:$x2: NanoCore.ClientPluginHost
        • 0x2d5c7:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0x156be:$s4: PipeCreated
        • 0x2e6a2:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        • 0x145fd:$s5: IClientLoggingHost
        • 0x2d5e1:$s5: IClientLoggingHost
        24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0xddf:$a: NanoCore
          • 0xe38:$a: NanoCore
          • 0xe75:$a: NanoCore
          • 0xeee:$a: NanoCore
          • 0x14599:$a: NanoCore
          • 0x145ae:$a: NanoCore
          • 0x145e3:$a: NanoCore
          • 0x2d57d:$a: NanoCore
          • 0x2d592:$a: NanoCore
          • 0x2d5c7:$a: NanoCore
          • 0xe41:$b: ClientPlugin
          • 0xe7e:$b: ClientPlugin
          • 0x177c:$b: ClientPlugin
          • 0x1789:$b: ClientPlugin
          • 0x14355:$b: ClientPlugin
          • 0x14370:$b: ClientPlugin
          • 0x143a0:$b: ClientPlugin
          • 0x145b7:$b: ClientPlugin
          • 0x145ec:$b: ClientPlugin
          • 0x2d339:$b: ClientPlugin
          • 0x2d354:$b: ClientPlugin
          12.2.7lQnHeq3XF.exe.5b90000.10.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xf7ad:$x1: NanoCore.ClientPluginHost
          • 0xf7da:$x2: IClientNetworkHost
          Click to see the 75 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\7lQnHeq3XF.exe, ProcessId: 784, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\7lQnHeq3XF.exe, ProcessId: 784, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\7lQnHeq3XF.exe, ProcessId: 784, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\7lQnHeq3XF.exe, ProcessId: 784, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6ceec185-c99e-4d5c-8685-49487283", "Group": "Guage12", "Domain1": "185.136.169.24", "Domain2": "127.0.0.1", "Port": 54984, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\CLJgKpOuw.exeMetadefender: Detection: 28%Perma Link
          Source: C:\Users\user\AppData\Roaming\CLJgKpOuw.exeReversingLabs: Detection: 79%
          Multi AV Scanner detection for submitted fileShow sources
          Source: 7lQnHeq3XF.exeVirustotal: Detection: 74%Perma Link
          Source: 7lQnHeq3XF.exeMetadefender: Detection: 28%Perma Link
          Source: 7lQnHeq3XF.exeReversingLabs: Detection: 79%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.476199801.0000000003261000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.410520702.0000000002CB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 576, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 3088, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 5360, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 784, type: MEMORY
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b90000.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d04c35.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42ab7d6.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b4c35.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.7lQnHeq3XF.exe.3c0d568.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.7lQnHeq3XF.exe.35ed568.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d0060c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b94629.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b060c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.7lQnHeq3XF.exe.3c0d568.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b90000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.7lQnHeq3XF.exe.35ed568.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b060c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d0060c.3.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\CLJgKpOuw.exeJoe Sandbox ML: detected
          Machine Learning detection for sampleShow sources
          Source: 7lQnHeq3XF.exeJoe Sandbox ML: detected
          Source: 24.0.7lQnHeq3XF.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 24.0.7lQnHeq3XF.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 24.2.7lQnHeq3XF.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 12.2.7lQnHeq3XF.exe.5b90000.10.unpackAvira: Label: TR/NanoCore.fadte
          Source: 7lQnHeq3XF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 7lQnHeq3XF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: 185.136.169.24
          Source: Malware configuration extractorURLs: 127.0.0.1
          Source: global trafficTCP traffic: 192.168.2.3:49732 -> 185.136.169.24:54984
          Source: Joe Sandbox ViewASN Name: VELIANET-ASvelianetInternetdiensteGmbHDE VELIANET-ASvelianetInternetdiensteGmbHDE
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: unknownTCP traffic detected without corresponding DNS query: 185.136.169.24
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: 7lQnHeq3XF.exe, 00000000.00000002.296094481.0000000002521000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.395084402.0000000002B41000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com%
          Source: 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211078227.0000000005496000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211024388.0000000005496000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmld
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comFA%
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comTTF
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comals
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalsd
          Source: 7lQnHeq3XF.exe, 00000000.00000002.301189868.0000000005450000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcom~%g
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd
          Source: 7lQnHeq3XF.exe, 00000000.00000003.210312273.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comld%
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comtuede%B
          Source: 7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comue6%
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: 7lQnHeq3XF.exe, 00000000.00000003.212456637.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: 7lQnHeq3XF.exe, 00000000.00000003.212456637.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/e%B
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: 7lQnHeq3XF.exe, 00000000.00000003.207513572.0000000005456000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/%
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208508628.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//%
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/6%
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/8
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/H%
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
          Source: 7lQnHeq3XF.exe, 00000000.00000003.207513572.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Z%K
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208508628.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/e%B
          Source: 7lQnHeq3XF.exe, 00000000.00000003.207513572.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ge
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Z%K
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208508628.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/~%g
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/l%y
          Source: 7lQnHeq3XF.exe, 00000000.00000003.207513572.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/lts
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208508628.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vno
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/wa
          Source: 7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/~%g
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: 7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: 7lQnHeq3XF.exe, 00000000.00000002.295749634.0000000000A10000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.476199801.0000000003261000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.410520702.0000000002CB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 576, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 3088, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 5360, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 784, type: MEMORY
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b90000.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d04c35.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42ab7d6.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b4c35.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.7lQnHeq3XF.exe.3c0d568.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.7lQnHeq3XF.exe.35ed568.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d0060c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b94629.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b060c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.7lQnHeq3XF.exe.3c0d568.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b90000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.7lQnHeq3XF.exe.35ed568.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b060c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d0060c.3.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.483484770.0000000005930000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000018.00000002.410520702.0000000002CB1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 576, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 576, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 3088, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 3088, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 5360, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 5360, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 784, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 784, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.7lQnHeq3XF.exe.5b90000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 24.2.7lQnHeq3XF.exe.3d04c35.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 24.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 24.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.7lQnHeq3XF.exe.42ab7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.7lQnHeq3XF.exe.42ab7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.7lQnHeq3XF.exe.42b4c35.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 24.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 24.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.7lQnHeq3XF.exe.5930000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 24.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 24.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.7lQnHeq3XF.exe.35ed568.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.7lQnHeq3XF.exe.35ed568.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 24.2.7lQnHeq3XF.exe.3d0060c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.7lQnHeq3XF.exe.5b94629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.7lQnHeq3XF.exe.42b060c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.7lQnHeq3XF.exe.5b90000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.7lQnHeq3XF.exe.328ca84.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.7lQnHeq3XF.exe.35ed568.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.7lQnHeq3XF.exe.35ed568.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.7lQnHeq3XF.exe.42b060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 24.2.7lQnHeq3XF.exe.2d19530.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 24.2.7lQnHeq3XF.exe.3d0060c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          .NET source code contains very large stringsShow sources
          Source: 7lQnHeq3XF.exe, GraphicsUtility/Form1.csLong String: Length: 11840
          Source: CLJgKpOuw.exe.0.dr, GraphicsUtility/Form1.csLong String: Length: 11840
          Source: 0.2.7lQnHeq3XF.exe.230000.0.unpack, GraphicsUtility/Form1.csLong String: Length: 11840
          Source: 0.0.7lQnHeq3XF.exe.230000.0.unpack, GraphicsUtility/Form1.csLong String: Length: 11840
          Source: 12.0.7lQnHeq3XF.exe.ec0000.2.unpack, GraphicsUtility/Form1.csLong String: Length: 11840
          Source: 12.0.7lQnHeq3XF.exe.ec0000.4.unpack, GraphicsUtility/Form1.csLong String: Length: 11840
          Source: 12.0.7lQnHeq3XF.exe.ec0000.0.unpack, GraphicsUtility/Form1.csLong String: Length: 11840
          Source: 12.2.7lQnHeq3XF.exe.ec0000.1.unpack, GraphicsUtility/Form1.csLong String: Length: 11840
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_00237194
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_045215D0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_0452365F
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_04520040
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_04521302
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_045215C8
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_04521018
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_04520006
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF7618
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF67E0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF5F50
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFCCB8
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF4528
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFAD28
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF3A0B
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF5361
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFB850
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFA6C0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFD6E0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF5E9F
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFA6B2
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF0E58
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFBE35
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFB76F
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFB7B0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF5F15
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF6C71
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF9410
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF9402
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFBD48
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFAB70
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFAB62
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFA018
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFA008
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFD1E8
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFA918
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DFA90A
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_00EC7194
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_0312E471
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_0312E480
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_0312BBD4
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_057BF5F8
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_057B9788
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_057BA5D0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_057BA610
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_06C20040
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_00787194
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0291C124
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0291E570
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0291E560
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_02A41268
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_02A433C7
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_02A4125A
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_02A45CA8
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_02A40CB0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557FCD8
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557BD58
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557AD32
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05574528
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05576C71
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05579410
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05579402
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557ACE8
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05575F50
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05575F15
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_055767E0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05577618
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557A6C0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05575E9F
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557A6BA
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557E958
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557A918
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557A90A
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557D1E8
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557B850
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557A018
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557A008
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557AB70
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05575361
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_0557AB60
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05570A70
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 23_2_00307194
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 24_2_008A7194
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 24_2_02A9E480
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 24_2_02A9E471
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 24_2_02A9BBD4
          Source: 7lQnHeq3XF.exe, 00000000.00000000.201215221.00000000002B0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamek8qTx2Z.exeB vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000000.00000002.309170872.0000000006C00000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000000.00000002.309329357.0000000006F30000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000000.00000002.295749634.0000000000A10000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000000.00000002.309836654.000000000DF90000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000000.00000002.296094481.0000000002521000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWindowsNetwork.dll> vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.476199801.0000000003261000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 0000000C.00000000.293132273.0000000000F40000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamek8qTx2Z.exeB vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.484062512.0000000006780000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.483251040.00000000058A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.485001636.0000000007370000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000010.00000002.402371702.0000000006C80000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000010.00000002.393428416.0000000000800000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamek8qTx2Z.exeB vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000010.00000002.402963532.00000000070F0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395084402.0000000002B41000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWindowsNetwork.dll> vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000010.00000002.403083685.0000000007140000.00000002.00000001.sdmpBinary or memory string: originalfilename vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000010.00000002.403083685.0000000007140000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000017.00000002.389689688.0000000000380000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamek8qTx2Z.exeB vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000018.00000000.391969474.0000000000920000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamek8qTx2Z.exeB vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exe, 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exeBinary or memory string: OriginalFilenamek8qTx2Z.exeB vs 7lQnHeq3XF.exe
          Source: 7lQnHeq3XF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.483484770.0000000005930000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000002.483484770.0000000005930000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000018.00000002.410520702.0000000002CB1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 576, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 576, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 3088, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 3088, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 5360, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 5360, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 784, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: 7lQnHeq3XF.exe PID: 784, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.7lQnHeq3XF.exe.5b90000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.5b90000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 24.2.7lQnHeq3XF.exe.3d04c35.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 24.2.7lQnHeq3XF.exe.3d04c35.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 24.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 24.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 24.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.7lQnHeq3XF.exe.42ab7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.42ab7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 12.2.7lQnHeq3XF.exe.42ab7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.7lQnHeq3XF.exe.42b4c35.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.42b4c35.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 24.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 24.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 24.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.7lQnHeq3XF.exe.5930000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.5930000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 24.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 24.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 24.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.7lQnHeq3XF.exe.35ed568.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.7lQnHeq3XF.exe.35ed568.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 24.2.7lQnHeq3XF.exe.3d0060c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 24.2.7lQnHeq3XF.exe.3d0060c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 12.2.7lQnHeq3XF.exe.5b94629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.5b94629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 12.2.7lQnHeq3XF.exe.42b060c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.42b060c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 16.2.7lQnHeq3XF.exe.3c0d568.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.7lQnHeq3XF.exe.5b90000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.5b90000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 12.2.7lQnHeq3XF.exe.328ca84.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.328ca84.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.7lQnHeq3XF.exe.35ed568.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.7lQnHeq3XF.exe.35ed568.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.7lQnHeq3XF.exe.35ed568.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.7lQnHeq3XF.exe.42b060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.7lQnHeq3XF.exe.42b060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 24.2.7lQnHeq3XF.exe.2d19530.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 24.2.7lQnHeq3XF.exe.2d19530.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 24.2.7lQnHeq3XF.exe.3d0060c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 24.2.7lQnHeq3XF.exe.3d0060c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7lQnHeq3XF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: CLJgKpOuw.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: 7lQnHeq3XF.exe, GraphicsUtility/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: CLJgKpOuw.exe.0.dr, GraphicsUtility/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.2.7lQnHeq3XF.exe.230000.0.unpack, GraphicsUtility/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.7lQnHeq3XF.exe.230000.0.unpack, GraphicsUtility/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 12.0.7lQnHeq3XF.exe.ec0000.2.unpack, GraphicsUtility/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 7lQnHeq3XF.exe, GraphicsUtility/Form1.csBase64 encoded string: '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
          Source: CLJgKpOuw.exe.0.dr, GraphicsUtility/Form1.csBase64 encoded string: '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
          Source: 0.2.7lQnHeq3XF.exe.230000.0.unpack, GraphicsUtility/Form1.csBase64 encoded string: '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
          Source: 0.0.7lQnHeq3XF.exe.230000.0.unpack, GraphicsUtility/Form1.csBase64 encoded string: 'sHFvx0q4/K8lnT8Bgj7Honj9FeoJx3m09qQQKpOks/cvHlhu13IwlA6Q9a/gNBVJ5cXjmRKZ1D916MKREyEpQ+XF45kSmdQ/dejCkRMhKUPSgzApG55hJQOLjnxIL0qsdY2TttP6jIcpFBK26FGQz1ese92VWgsRJFT1srbgo5SFPIMk+jbLKTQ5ewNnKClI5csh6i5HItc6B40fr9wVIfYpUxb63Gvz4DGxgcD7qn2prJsnnb2tpZ+3zDqOUhcoTOoF0F7KDoLSLZDP3aQ5cAqh/bcGXWvQpfVDZoDC66W+BXEQw8VkWZAHPNKFE6WCHrFZSZRNnLmsFEVYbuP2vRCSCNnl0QunusjLYUjrpmh8VErpWAY1/V7I16y0VjoyjJuT69eJwLLel386l6eu5zOdayzYn9f1bz4+PeJ6zc9S6VznOgoJxyU4RtV6leF5RLtVRK4K2xwzlGl4S/N590FaRLlGOPlfKNdzdFir8QflxeOZEpnUP3XowpETISlDpZLKzGPxa3hdz4DwbjDcc2srJss/5AE3iTTPVpMvnT3lxeOZEpnUP3XowpETISlD5cXjmRKZ1D916MKREyEpQ26fR4EqClUekMyy8JYlF4mhzAzkwjl6MfyoOTTcd8YLKV4iIa2nFdRG/0tmBA5F17vQoxVBC+VMpaHf+LDY9uoLgbS3OvTHjB4z6ATcexiD+BGzDIGF8i8sdwK37YiT7hl2F/q17ITRu8puCI03h0vYgApWSMzrOwpk1K8poGk58pKbf/rDJ+Wmlx4VqSr3FRbB7ROoZSwuv5jck6gq1ANSOE4p1mBTW7tUEDC5OhN4Ggam4cNlgQPNZ62TSQI34+XF45kSmdQ/dejCkRMhKUMAdKkhCtKfMz72Xjl6d28qckd98yNwUw5Jb9wIFTEt8TieERMI4DOIsS7yxqvr31bRPtv1MS1ywR0uaoqLv9f75cXjmRKZ1D916MKREyEpQ+XF45kSmdQ/dejCkRMhKUPlxeOZEpnUP3XowpETISlD5cXjmRKZ1D916MKREyEpQ3JwJ4VzyMJKtZ3YcJWTlL1clHy1870fxampdBuvXNfvXwX7ebWYAujUkI1p06DWcIZ8aHDFwhmiitL/Z1hUUqlC/YiLHRV1qM0Ll9ezSZkxPwNbLhOZlLUe/qnjd0S4srlMRiwjDI21yIvWuk0esyBaS0wKotzmnw+UPbxQ5oHRUzXVbObKzD0HYpY3LE0kj7vF2HHOxw7idghcbgZamDooLKOhWujPGki/K6udtE1TRzc3msEKOIDkm9an8y1c0lSbFcXCtXPfe+gEgfc4/Es1gdQDYVZyGFP5P6uPJer6VhZj2Pk5thDheeSeNf8at+JIhQW8+c2F3C0JdrjYlnGrg97WhyPWGXXWJz9NSLQsYWZ83S8PhP5fzdwAORrh+mujd8hECfApbxrnj97/XWwtexHAGJa5LTDn0knJM4vJILf0bomdgsHjBAes05UlQxfqroKkXn6+YdOxoCL2Z6Y9DRBZzyY/sKu76eKC9+QAKHc9bPxQCRg5appJa+94hx68xx7oNt6xlWPTS/H3yYTor61TowoNqfGq69zZtWQnfE2KWV3G+DyORVz/X0qNuVC0tZwyby9jJVStPIWiduwIJzj5hQJVVPlCuJJAlU9KO0GpE3Pk59BWHZEJcwMQaE5t6u45WGtl6tdxsbQaZxG3heJIFBwAjqKpnFYYblJi5wwGBxx2ix6ow7XJecOYCOgLqIivQNTGkQFnUpfm2NoVB68a/KLB9rgxkzBA0KyIGIu8vWxN33/smlvn2FcM+voO9S1+iJcxPpzA6iWTClylgNYhU2deMt99dplwvgYxN+ysgyP9UpF148LvLDtmsRBD8RAiZUBJYmzeI6GlaQbVhQVeKy0obtUOIgi9VAhg/7HvGTgA//jxDckjRpMO/LtX6P9FxTgsDZFxDPJPxcJL25Sumzgn1QAifuMVx4iTlxqoDuLNdzpEynqMIUKTpXkJ4fwSu5mS3k+ZbyMdoG3melEL+LJeMjnHoM0w8fkxzi8Oz8Jv+6EczfzayCr4/7viN3yE3hFBzobrU5FUhq1GDkXNjPrHV2ygHDx82I/UHt7RLrUJYTCso4SckUnNO8asAAI7bTPhbFjpOVd8gQglG5XDU0bwaez21nmMNhmcqz8V/AZ4s0uXzfqZV/clH8CXqIIqaPB9MCDoiGFb8YSnBqn7z9wRwcRH3NRaRBvx85UJyZ974GGVrIETpQLvKdReZG480v+U5KmJtAjgU6yJLs70uQBYaKBwpYwidctnM2C4Kqveg6wHnBorkE2qLHr0tmAZCfxWEXGMuZ6f9yPLMJL/CDVNsG6yYbUiVB9THoEmJPpQWN3d1aAUZI1MSPWsyiNhJU6UShO1cvwLwlqokE21dRKBvnPbpGvi3z5mSHeWgInyGH9L3uxmeo7R6iKc+nLbk2hzVEjkldvnSGiklzXG7fyLXAuUP6mxdfKDDVIcMbvqpc7CsVZIQRqZ4tdVvd82TGNPT+wYn4O+a0dqgX34iiVqcKmaYBgFJbRNQlH4TQXZxsxSkXJQ1TzJhZVVxmaW+vyji22X+MT+YrbJbFeLQUqDL60KNkvo0KJJdRwZAChES3/HzHKFpnaKPTipU/wmbW26CYKcML7LHBopROI3mEAisXywtDv61Yc7DU2gTBnDlWI//8d/jR9U7Unw3ASITKWtkhfsDA+tWTAACf08NxNpYE6xmLy1OexrC5+0AVkV8cwvjbqyjC55/pp2org1XfCn7xMQsinwRnoQBSrAzDZpcxCH9W08ar1At5PUkL0buheToyR8jGmIiVXLiZFNHzDaAl08fFpMy1JYyhl0u0JzfDWhgAtwTP1wwOULIViwAVSREGtlGe0hzhguuGfxuHklTDCpd4nPrvPehQm8qOIsnnp3n5JDm5qWyATGEh+V2NPPvUwXawdHozBktdV27qaUl+HNM7fOT37sLLawcxkQcca
          Source: 12.0.7lQnHeq3XF.exe.ec0000.2.unpack, GraphicsUtility/Form1.csBase64 encoded string: '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
          Source: 12.0.7lQnHeq3XF.exe.ec0000.4.unpack, GraphicsUtility/Form1.csBase64 encoded string: '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
          Source: 12.0.7lQnHeq3XF.exe.ec0000.0.unpack, GraphicsUtility/Form1.csBase64 encoded string: 'sHFvx0q4/K8lnT8Bgj7Honj9FeoJx3m09qQQKpOks/cvHlhu13IwlA6Q9a/gNBVJ5cXjmRKZ1D916MKREyEpQ+XF45kSmdQ/dejCkRMhKUPSgzApG55hJQOLjnxIL0qsdY2TttP6jIcpFBK26FGQz1ese92VWgsRJFT1srbgo5SFPIMk+jbLKTQ5ewNnKClI5csh6i5HItc6B40fr9wVIfYpUxb63Gvz4DGxgcD7qn2prJsnnb2tpZ+3zDqOUhcoTOoF0F7KDoLSLZDP3aQ5cAqh/bcGXWvQpfVDZoDC66W+BXEQw8VkWZAHPNKFE6WCHrFZSZRNnLmsFEVYbuP2vRCSCNnl0QunusjLYUjrpmh8VErpWAY1/V7I16y0VjoyjJuT69eJwLLel386l6eu5zOdayzYn9f1bz4+PeJ6zc9S6VznOgoJxyU4RtV6leF5RLtVRK4K2xwzlGl4S/N590FaRLlGOPlfKNdzdFir8QflxeOZEpnUP3XowpETISlDpZLKzGPxa3hdz4DwbjDcc2srJss/5AE3iTTPVpMvnT3lxeOZEpnUP3XowpETISlD5cXjmRKZ1D916MKREyEpQ26fR4EqClUekMyy8JYlF4mhzAzkwjl6MfyoOTTcd8YLKV4iIa2nFdRG/0tmBA5F17vQoxVBC+VMpaHf+LDY9uoLgbS3OvTHjB4z6ATcexiD+BGzDIGF8i8sdwK37YiT7hl2F/q17ITRu8puCI03h0vYgApWSMzrOwpk1K8poGk58pKbf/rDJ+Wmlx4VqSr3FRbB7ROoZSwuv5jck6gq1ANSOE4p1mBTW7tUEDC5OhN4Ggam4cNlgQPNZ62TSQI34+XF45kSmdQ/dejCkRMhKUMAdKkhCtKfMz72Xjl6d28qckd98yNwUw5Jb9wIFTEt8TieERMI4DOIsS7yxqvr31bRPtv1MS1ywR0uaoqLv9f75cXjmRKZ1D916MKREyEpQ+XF45kSmdQ/dejCkRMhKUPlxeOZEpnUP3XowpETISlD5cXjmRKZ1D916MKREyEpQ3JwJ4VzyMJKtZ3YcJWTlL1clHy1870fxampdBuvXNfvXwX7ebWYAujUkI1p06DWcIZ8aHDFwhmiitL/Z1hUUqlC/YiLHRV1qM0Ll9ezSZkxPwNbLhOZlLUe/qnjd0S4srlMRiwjDI21yIvWuk0esyBaS0wKotzmnw+UPbxQ5oHRUzXVbObKzD0HYpY3LE0kj7vF2HHOxw7idghcbgZamDooLKOhWujPGki/K6udtE1TRzc3msEKOIDkm9an8y1c0lSbFcXCtXPfe+gEgfc4/Es1gdQDYVZyGFP5P6uPJer6VhZj2Pk5thDheeSeNf8at+JIhQW8+c2F3C0JdrjYlnGrg97WhyPWGXXWJz9NSLQsYWZ83S8PhP5fzdwAORrh+mujd8hECfApbxrnj97/XWwtexHAGJa5LTDn0knJM4vJILf0bomdgsHjBAes05UlQxfqroKkXn6+YdOxoCL2Z6Y9DRBZzyY/sKu76eKC9+QAKHc9bPxQCRg5appJa+94hx68xx7oNt6xlWPTS/H3yYTor61TowoNqfGq69zZtWQnfE2KWV3G+DyORVz/X0qNuVC0tZwyby9jJVStPIWiduwIJzj5hQJVVPlCuJJAlU9KO0GpE3Pk59BWHZEJcwMQaE5t6u45WGtl6tdxsbQaZxG3heJIFBwAjqKpnFYYblJi5wwGBxx2ix6ow7XJecOYCOgLqIivQNTGkQFnUpfm2NoVB68a/KLB9rgxkzBA0KyIGIu8vWxN33/smlvn2FcM+voO9S1+iJcxPpzA6iWTClylgNYhU2deMt99dplwvgYxN+ysgyP9UpF148LvLDtmsRBD8RAiZUBJYmzeI6GlaQbVhQVeKy0obtUOIgi9VAhg/7HvGTgA//jxDckjRpMO/LtX6P9FxTgsDZFxDPJPxcJL25Sumzgn1QAifuMVx4iTlxqoDuLNdzpEynqMIUKTpXkJ4fwSu5mS3k+ZbyMdoG3melEL+LJeMjnHoM0w8fkxzi8Oz8Jv+6EczfzayCr4/7viN3yE3hFBzobrU5FUhq1GDkXNjPrHV2ygHDx82I/UHt7RLrUJYTCso4SckUnNO8asAAI7bTPhbFjpOVd8gQglG5XDU0bwaez21nmMNhmcqz8V/AZ4s0uXzfqZV/clH8CXqIIqaPB9MCDoiGFb8YSnBqn7z9wRwcRH3NRaRBvx85UJyZ974GGVrIETpQLvKdReZG480v+U5KmJtAjgU6yJLs70uQBYaKBwpYwidctnM2C4Kqveg6wHnBorkE2qLHr0tmAZCfxWEXGMuZ6f9yPLMJL/CDVNsG6yYbUiVB9THoEmJPpQWN3d1aAUZI1MSPWsyiNhJU6UShO1cvwLwlqokE21dRKBvnPbpGvi3z5mSHeWgInyGH9L3uxmeo7R6iKc+nLbk2hzVEjkldvnSGiklzXG7fyLXAuUP6mxdfKDDVIcMbvqpc7CsVZIQRqZ4tdVvd82TGNPT+wYn4O+a0dqgX34iiVqcKmaYBgFJbRNQlH4TQXZxsxSkXJQ1TzJhZVVxmaW+vyji22X+MT+YrbJbFeLQUqDL60KNkvo0KJJdRwZAChES3/HzHKFpnaKPTipU/wmbW26CYKcML7LHBopROI3mEAisXywtDv61Yc7DU2gTBnDlWI//8d/jR9U7Unw3ASITKWtkhfsDA+tWTAACf08NxNpYE6xmLy1OexrC5+0AVkV8cwvjbqyjC55/pp2org1XfCn7xMQsinwRnoQBSrAzDZpcxCH9W08ar1At5PUkL0buheToyR8jGmIiVXLiZFNHzDaAl08fFpMy1JYyhl0u0JzfDWhgAtwTP1wwOULIViwAVSREGtlGe0hzhguuGfxuHklTDCpd4nPrvPehQm8qOIsnnp3n5JDm5qWyATGEh+V2NPPvUwXawdHozBktdV27qaUl+HNM7fOT37sLLawcxkQcca
          Source: 12.2.7lQnHeq3XF.exe.ec0000.1.unpack, GraphicsUtility/Form1.csBase64 encoded string: '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
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: classification engineClassification label: mal100.troj.evad.winEXE@17/7@0/2
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeFile created: C:\Users\user\AppData\Roaming\CLJgKpOuw.exeJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5568:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4128:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4280:120:WilError_01
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6ceec185-c99e-4d5c-8685-49487283603e}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeMutant created: \Sessions\1\BaseNamedObjects\FoBYiFa
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6F2E.tmpJump to behavior
          Source: 7lQnHeq3XF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: 7lQnHeq3XF.exeVirustotal: Detection: 74%
          Source: 7lQnHeq3XF.exeMetadefender: Detection: 28%
          Source: 7lQnHeq3XF.exeReversingLabs: Detection: 79%
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeFile read: C:\Users\user\Desktop\7lQnHeq3XF.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe 'C:\Users\user\Desktop\7lQnHeq3XF.exe'
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp6F2E.tmp'
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe {path}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp8362.tmp'
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe C:\Users\user\Desktop\7lQnHeq3XF.exe 0
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp1E69.tmp'
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe {path}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe {path}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp6F2E.tmp'
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe {path}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp8362.tmp'
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp1E69.tmp'
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe {path}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe {path}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: 7lQnHeq3XF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 7lQnHeq3XF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: 7lQnHeq3XF.exe, GraphicsUtility/Form1.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: CLJgKpOuw.exe.0.dr, GraphicsUtility/Form1.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.7lQnHeq3XF.exe.230000.0.unpack, GraphicsUtility/Form1.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.7lQnHeq3XF.exe.230000.0.unpack, GraphicsUtility/Form1.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.0.7lQnHeq3XF.exe.ec0000.2.unpack, GraphicsUtility/Form1.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.0.7lQnHeq3XF.exe.ec0000.4.unpack, GraphicsUtility/Form1.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.0.7lQnHeq3XF.exe.ec0000.0.unpack, GraphicsUtility/Form1.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 12.2.7lQnHeq3XF.exe.ec0000.1.unpack, GraphicsUtility/Form1.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_045223B2 push ebx; retf
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 0_2_06DF7087 pushfd ; iretd
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_057B69FB push esp; retf
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 12_2_057B69F8 pushad ; retf
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_02A45A6C push cs; iretd
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_02A4204A push ebx; retf
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeCode function: 16_2_05577087 pushfd ; iretd
          Source: initial sampleStatic PE information: section name: .text entropy: 7.70438467215
          Source: initial sampleStatic PE information: section name: .text entropy: 7.70438467215
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeFile created: C:\Users\user\AppData\Roaming\CLJgKpOuw.exeJump to dropped file

          Boot Survival:

          barindex
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp6F2E.tmp'

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeFile opened: C:\Users\user\Desktop\7lQnHeq3XF.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 3088, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 5360, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: 7lQnHeq3XF.exe, 00000000.00000002.296180901.000000000256C000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: 7lQnHeq3XF.exe, 00000000.00000002.296180901.000000000256C000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeWindow / User API: threadDelayed 5332
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeWindow / User API: threadDelayed 4039
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeWindow / User API: foregroundWindowGot 655
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exe TID: 5344Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exe TID: 2996Thread sleep time: -8301034833169293s >= -30000s
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exe TID: 4760Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exe TID: 5236Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeThread delayed: delay time: 922337203685477
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.485001636.0000000007370000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: 7lQnHeq3XF.exe, 00000000.00000002.295927491.0000000000ADF000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.485001636.0000000007370000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.485001636.0000000007370000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: 7lQnHeq3XF.exe, 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.485001636.0000000007370000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeMemory written: C:\Users\user\Desktop\7lQnHeq3XF.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeMemory written: C:\Users\user\Desktop\7lQnHeq3XF.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp6F2E.tmp'
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe {path}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp8362.tmp'
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp1E69.tmp'
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe {path}
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeProcess created: C:\Users\user\Desktop\7lQnHeq3XF.exe {path}
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.481443074.0000000003722000.00000004.00000001.sdmpBinary or memory string: Program Manager
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.475220912.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.475220912.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.475220912.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Users\user\Desktop\7lQnHeq3XF.exe VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Users\user\Desktop\7lQnHeq3XF.exe VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Users\user\Desktop\7lQnHeq3XF.exe VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Users\user\Desktop\7lQnHeq3XF.exe VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\7lQnHeq3XF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.476199801.0000000003261000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.410520702.0000000002CB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 576, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 3088, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 5360, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 784, type: MEMORY
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b90000.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d04c35.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42ab7d6.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b4c35.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.7lQnHeq3XF.exe.3c0d568.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.7lQnHeq3XF.exe.35ed568.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d0060c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b94629.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b060c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.7lQnHeq3XF.exe.3c0d568.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b90000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.7lQnHeq3XF.exe.35ed568.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b060c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d0060c.3.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: 7lQnHeq3XF.exe, 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.476199801.0000000003261000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: 7lQnHeq3XF.exe, 0000000C.00000002.476199801.0000000003261000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: 7lQnHeq3XF.exe, 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: 7lQnHeq3XF.exe, 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: 7lQnHeq3XF.exe, 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.476199801.0000000003261000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.410520702.0000000002CB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 576, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 3088, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 5360, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 7lQnHeq3XF.exe PID: 784, type: MEMORY
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3cfb7d6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b90000.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d04c35.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42ab7d6.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b4c35.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.7lQnHeq3XF.exe.3c0d568.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.7lQnHeq3XF.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.7lQnHeq3XF.exe.35ed568.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.7lQnHeq3XF.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d0060c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b94629.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b060c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.7lQnHeq3XF.exe.3c0d568.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.5b90000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.7lQnHeq3XF.exe.35ed568.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.7lQnHeq3XF.exe.42b060c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.7lQnHeq3XF.exe.3d0060c.3.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Masquerading1Input Capture21Security Software Discovery211Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information21DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 432802 Sample: 7lQnHeq3XF Startdate: 10/06/2021 Architecture: WINDOWS Score: 100 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 Multi AV Scanner detection for dropped file 2->53 55 11 other signatures 2->55 8 7lQnHeq3XF.exe 6 2->8         started        12 7lQnHeq3XF.exe 4 2->12         started        process3 file4 35 C:\Users\user\AppData\Roaming\CLJgKpOuw.exe, PE32 8->35 dropped 37 C:\Users\user\AppData\Local\...\tmp6F2E.tmp, XML 8->37 dropped 39 C:\Users\user\AppData\...\7lQnHeq3XF.exe.log, ASCII 8->39 dropped 57 Uses schtasks.exe or at.exe to add and modify task schedules 8->57 59 Injects a PE file into a foreign processes 8->59 14 7lQnHeq3XF.exe 8 8->14         started        19 schtasks.exe 1 8->19         started        21 schtasks.exe 1 12->21         started        23 7lQnHeq3XF.exe 2 12->23         started        25 7lQnHeq3XF.exe 12->25         started        signatures5 process6 dnsIp7 43 185.136.169.24, 54984 VELIANET-ASvelianetInternetdiensteGmbHDE United Kingdom 14->43 45 127.0.0.1 unknown unknown 14->45 41 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 14->41 dropped 47 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->47 27 schtasks.exe 1 14->27         started        29 conhost.exe 19->29         started        31 conhost.exe 21->31         started        file8 signatures9 process10 process11 33 conhost.exe 27->33         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          7lQnHeq3XF.exe74%VirustotalBrowse
          7lQnHeq3XF.exe34%MetadefenderBrowse
          7lQnHeq3XF.exe79%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          7lQnHeq3XF.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\CLJgKpOuw.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\CLJgKpOuw.exe34%MetadefenderBrowse
          C:\Users\user\AppData\Roaming\CLJgKpOuw.exe79%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          24.0.7lQnHeq3XF.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          24.0.7lQnHeq3XF.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          12.0.7lQnHeq3XF.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          12.2.7lQnHeq3XF.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          24.2.7lQnHeq3XF.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          12.0.7lQnHeq3XF.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          12.2.7lQnHeq3XF.exe.5b90000.10.unpack100%AviraTR/NanoCore.fadteDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/lts0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/e%B0%Avira URL Cloudsafe
          http://www.fontbureau.comue6%0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/e%B0%Avira URL Cloudsafe
          http://www.fontbureau.comFA%0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/Z%K0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/l%y0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/~%g0%Avira URL Cloudsafe
          http://www.fontbureau.comTTF0%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
          http://www.fontbureau.com%0%Avira URL Cloudsafe
          185.136.169.240%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/%0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/%0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/%0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          127.0.0.10%Avira URL Cloudsafe
          http://www.fontbureau.comalsd0%URL Reputationsafe
          http://www.fontbureau.comalsd0%URL Reputationsafe
          http://www.fontbureau.comalsd0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.fontbureau.comF0%URL Reputationsafe
          http://www.fontbureau.comF0%URL Reputationsafe
          http://www.fontbureau.comF0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/wa0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/vno0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/Z%K0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp//%0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/~%g0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.fontbureau.comd0%URL Reputationsafe
          http://www.fontbureau.comd0%URL Reputationsafe
          http://www.fontbureau.comd0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/H%0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/ge0%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.fontbureau.comcom~%g0%Avira URL Cloudsafe
          http://www.fontbureau.comtuede%B0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/6%0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.fontbureau.comals0%URL Reputationsafe
          http://www.fontbureau.comals0%URL Reputationsafe
          http://www.fontbureau.comals0%URL Reputationsafe
          http://www.fontbureau.comld%0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          185.136.169.24true
          • Avira URL Cloud: safe
          unknown
          127.0.0.1true
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.fontbureau.com/designersG7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designers/?7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cn/bThe7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/lts7lQnHeq3XF.exe, 00000000.00000003.207513572.0000000005456000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.galapagosdesign.com/e%B7lQnHeq3XF.exe, 00000000.00000003.212456637.0000000005456000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers?7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.comue6%7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.jiyu-kobo.co.jp/e%B7lQnHeq3XF.exe, 00000000.00000003.208508628.0000000005456000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.comFA%7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.jiyu-kobo.co.jp/jp/Z%K7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.com7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/l%y7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/~%g7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                  high
                  http://www.fontbureau.comTTF7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.goodfont.co.kr7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.com7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netD7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cn/cThe7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htm7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.com7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/87lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com%7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.galapagosdesign.com/DPlease7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fonts.com7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/%7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sandoll.co.kr7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.deDPlease7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cn7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name7lQnHeq3XF.exe, 00000000.00000002.296094481.0000000002521000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.395084402.0000000002B41000.00000004.00000001.sdmpfalse
                      high
                      http://www.sakkal.com7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comalsd7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.07lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.com7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                          high
                          http://www.galapagosdesign.com/7lQnHeq3XF.exe, 00000000.00000003.212456637.0000000005456000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comF7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/wa7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/vno7lQnHeq3XF.exe, 00000000.00000003.208508628.0000000005456000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/Z%K7lQnHeq3XF.exe, 00000000.00000003.207513572.0000000005456000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp//%7lQnHeq3XF.exe, 00000000.00000003.208508628.0000000005456000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/~%g7lQnHeq3XF.exe, 00000000.00000003.208508628.0000000005456000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comd7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/H%7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmld7lQnHeq3XF.exe, 00000000.00000003.211024388.0000000005496000.00000004.00000001.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/ge7lQnHeq3XF.exe, 00000000.00000003.207513572.0000000005456000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.carterandcone.coml7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comcom~%g7lQnHeq3XF.exe, 00000000.00000002.301189868.0000000005450000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.fontbureau.com/designers/cabarga.htmlN7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comtuede%B7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://www.founder.com.cn/cn7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.html7lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                                high
                                http://www.fontbureau.com/designers/cabarga.html7lQnHeq3XF.exe, 00000000.00000003.211078227.0000000005496000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/6%7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/Y0/7lQnHeq3XF.exe, 00000000.00000003.208065677.0000000005456000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/7lQnHeq3XF.exe, 00000000.00000003.207513572.0000000005456000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers87lQnHeq3XF.exe, 00000000.00000002.308503618.00000000066E2000.00000004.00000001.sdmp, 7lQnHeq3XF.exe, 00000010.00000002.400664137.0000000005B80000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.comals7lQnHeq3XF.exe, 00000000.00000003.211489943.0000000005456000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comld%7lQnHeq3XF.exe, 00000000.00000003.210312273.0000000005456000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    low

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    185.136.169.24
                                    unknownUnited Kingdom
                                    29066VELIANET-ASvelianetInternetdiensteGmbHDEtrue

                                    Private

                                    IP
                                    127.0.0.1

                                    General Information

                                    Joe Sandbox Version:32.0.0 Black Diamond
                                    Analysis ID:432802
                                    Start date:10.06.2021
                                    Start time:19:03:07
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 12m 43s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:7lQnHeq3XF (renamed file extension from none to exe)
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:34
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@17/7@0/2
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 0% (good quality ratio 0%)
                                    • Quality average: 80%
                                    • Quality standard deviation: 0%
                                    HCA Information:
                                    • Successful, ratio: 97%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    Warnings:
                                    Show All
                                    • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    19:04:41API Interceptor684x Sleep call for process: 7lQnHeq3XF.exe modified
                                    19:04:42Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\7lQnHeq3XF.exe" s>$(Arg0)

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    185.136.169.2441d0d4f9999b50bd9636508b7a247b04e6b919b8ed32d.exeGet hashmaliciousBrowse
                                      cd933deed6ad151dbc88561ea55dc128b464843b481a4.exeGet hashmaliciousBrowse
                                        Letter of Demand.docGet hashmaliciousBrowse

                                          Domains

                                          No context

                                          ASN

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          VELIANET-ASvelianetInternetdiensteGmbHDEpivaa.apkGet hashmaliciousBrowse
                                          • 92.204.221.12
                                          Doc2000120201.xlsGet hashmaliciousBrowse
                                          • 185.136.169.163
                                          220bb2b7deba41f53a8d86d677691aff283314a29c27c.exeGet hashmaliciousBrowse
                                          • 185.136.169.163
                                          Scan003.docGet hashmaliciousBrowse
                                          • 185.136.169.109
                                          cce53a67bb01a8f71b21fbdbf1b8a32345d81bbec12df.exeGet hashmaliciousBrowse
                                          • 185.136.169.109
                                          RFQ#20053491.xlsxGet hashmaliciousBrowse
                                          • 92.204.160.45
                                          no.IV640381 refer PO 4500260781.xlsxGet hashmaliciousBrowse
                                          • 92.204.160.45
                                          Ultimate-File(1).docmGet hashmaliciousBrowse
                                          • 134.119.181.142
                                          Ultimate-File(1).docmGet hashmaliciousBrowse
                                          • 134.119.181.142
                                          AnyDesk (Sample).exeGet hashmaliciousBrowse
                                          • 78.138.106.22
                                          41d0d4f9999b50bd9636508b7a247b04e6b919b8ed32d.exeGet hashmaliciousBrowse
                                          • 185.136.169.24
                                          cd933deed6ad151dbc88561ea55dc128b464843b481a4.exeGet hashmaliciousBrowse
                                          • 185.136.169.24
                                          Letter of Demand.docGet hashmaliciousBrowse
                                          • 185.136.169.24
                                          2bb0000.exeGet hashmaliciousBrowse
                                          • 193.42.156.106
                                          RE New order.exeGet hashmaliciousBrowse
                                          • 92.204.163.146
                                          AnyDeskCKS.exeGet hashmaliciousBrowse
                                          • 185.136.157.77
                                          intercom.exeGet hashmaliciousBrowse
                                          • 134.119.186.216
                                          gJvdHdeawX.exeGet hashmaliciousBrowse
                                          • 134.119.186.216
                                          qbUoyUZWnC.exeGet hashmaliciousBrowse
                                          • 185.136.169.155
                                          SecuriteInfo.com.Ransom.Stop.P6.19307.exeGet hashmaliciousBrowse
                                          • 134.119.186.216

                                          JA3 Fingerprints

                                          No context

                                          Dropped Files

                                          No context

                                          Created / dropped Files

                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\7lQnHeq3XF.exe.log
                                          Process:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.355304211458859
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          C:\Users\user\AppData\Local\Temp\tmp1E69.tmp
                                          Process:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.19196486799254
                                          Encrypted:false
                                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBrtn:cbh47TlNQ//rydbz9I3YODOLNdq3v
                                          MD5:51C03E6FFF88EF349C81FF84C2F8F94B
                                          SHA1:34AE6BEAB2F34E7F754973D6FC23E4AD60A3EB64
                                          SHA-256:E37FD145922750F95C158B07866A9D73FD9D1B2DA67B9C9A478D7A4E35EF1089
                                          SHA-512:997EAF31A006EDBA09D98781F96482DA716CC5805BB5125965AB9525E22D10BE1C43B438AB5EF1B277CECE23B29CFA366EF70D02669C7A6518F10CF2C94FC7AF
                                          Malicious:false
                                          Reputation:low
                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                          C:\Users\user\AppData\Local\Temp\tmp6F2E.tmp
                                          Process:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.19196486799254
                                          Encrypted:false
                                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBrtn:cbh47TlNQ//rydbz9I3YODOLNdq3v
                                          MD5:51C03E6FFF88EF349C81FF84C2F8F94B
                                          SHA1:34AE6BEAB2F34E7F754973D6FC23E4AD60A3EB64
                                          SHA-256:E37FD145922750F95C158B07866A9D73FD9D1B2DA67B9C9A478D7A4E35EF1089
                                          SHA-512:997EAF31A006EDBA09D98781F96482DA716CC5805BB5125965AB9525E22D10BE1C43B438AB5EF1B277CECE23B29CFA366EF70D02669C7A6518F10CF2C94FC7AF
                                          Malicious:true
                                          Reputation:low
                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                          C:\Users\user\AppData\Local\Temp\tmp8362.tmp
                                          Process:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1300
                                          Entropy (8bit):5.123957763857257
                                          Encrypted:false
                                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0TXxtn:cbk4oL600QydbQxIYODOLedq3IXj
                                          MD5:9EDDF2EE551487EBE6C93C2F40EA7CAB
                                          SHA1:43689EB449EECAC751976B4969F5BEF0585C7057
                                          SHA-256:25F651D7FD2035C121EF8893AA407FEA84BF95233436AE20900418733046F26F
                                          SHA-512:5F293900A6A0AED425CBC384111A6A8848B0124E127E06F592502B256AC5791BB13603642A6402BF756DE0949612DF60BB33A467C1ABD9E477C1DE6C8F30337B
                                          Malicious:false
                                          Reputation:low
                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                          C:\Users\user\AppData\Roaming\CLJgKpOuw.exe
                                          Process:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):511488
                                          Entropy (8bit):7.692170481145156
                                          Encrypted:false
                                          SSDEEP:12288:qhBSAd7kDsfDQMZUVCfdtZqJq2QJoWr0p/zsq5X6NGmBx:qhBSo7kDsWiCKouEB6N
                                          MD5:9750DEE05B47F072E5975895DCF61AE5
                                          SHA1:95F456AE508245B4C6891AD1C847227D0C012D90
                                          SHA-256:EEA0F064AF6E7B61E19FF9ADE76EEAD562F5D3933D52C5CC7F2F5721D81B8C3D
                                          SHA-512:8C52E2F45A47D5FEE4F58C93478105E48D18D7BC9AA5FF9B3F5EA1477FB687C29037200125B38349E604CD841DCAF20D6B7B6542C57DBDC72488F9177BF7BA3B
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: Metadefender, Detection: 34%, Browse
                                          • Antivirus: ReversingLabs, Detection: 79%
                                          Reputation:low
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....3.`..............0.................. ........@.. .......................@............@.....................................O............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H.......H...(.......J...p...P...........................................".(.....*".(.....*^.(........}......}....*...0............{.....+..*.0............{.....+..*B...}......}....*....0..2.........o.....o....Y..o.....o....Y...Z..ZXl(....k...+..*...0..O........".......+0........., .......o.........,........o........X....i......-....+...*^.(........}......}....*..0............{.....+..*.0............{.....+..*B...}......}....*....0..2.........o.....o....Y..o.....o....Y...Z..ZX
                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                          Process:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          File Type:ISO-8859 text, with no line terminators
                                          Category:dropped
                                          Size (bytes):8
                                          Entropy (8bit):3.0
                                          Encrypted:false
                                          SSDEEP:3:u:u
                                          MD5:56FDE996BE3F8E26310C687C0CB102EB
                                          SHA1:7F6DA9DA4A1AD6C4B328B4A5B89F9CA439C4D012
                                          SHA-256:91B9404A440B92457001305F07E97746FE279BE58DF58A2AE09D365F5084EBC0
                                          SHA-512:9BBA08475C6AAD7AE79041A514B793C93C04B608A70D4E212E3D2BFF4AB863F41826C86C4E5D0CD348E475ADBD2B26C8E7242F794236D0124D81369E46B78C28
                                          Malicious:true
                                          Preview: ..E},.H
                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                          Process:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):37
                                          Entropy (8bit):4.496898555450565
                                          Encrypted:false
                                          SSDEEP:3:oNWXp5vSJcnCn:oNWXpFSJ/n
                                          MD5:E393A7661EB5342CB1854E7658086172
                                          SHA1:ABB9A18EB2C16D0EBD6AAFA86D7898B34C5BF479
                                          SHA-256:73DD810932A854CB4143C58082C6F21F8138223A499B68C26BAB51DF00C4DF8B
                                          SHA-512:E7358C03D19D88A4B9B782DC26B98B2C4A601C6CBF6B2342A62C3C73D1AFA24D4DDA157779D98ED1616D9D060DEF81292C8DAC83B7BA9BA8FB9722E6B196B346
                                          Malicious:false
                                          Preview: C:\Users\user\Desktop\7lQnHeq3XF.exe

                                          Static File Info

                                          General

                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.692170481145156
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:7lQnHeq3XF.exe
                                          File size:511488
                                          MD5:9750dee05b47f072e5975895dcf61ae5
                                          SHA1:95f456ae508245b4c6891ad1c847227d0c012d90
                                          SHA256:eea0f064af6e7b61e19ff9ade76eead562f5d3933d52c5cc7f2f5721d81b8c3d
                                          SHA512:8c52e2f45a47d5fee4f58c93478105e48d18d7bc9aa5ff9b3f5ea1477fb687c29037200125b38349e604cd841dcaf20d6b7b6542c57dbdc72488f9177bf7ba3b
                                          SSDEEP:12288:qhBSAd7kDsfDQMZUVCfdtZqJq2QJoWr0p/zsq5X6NGmBx:qhBSo7kDsWiCKouEB6N
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....3.`..............0.................. ........@.. .......................@............@................................

                                          File Icon

                                          Icon Hash:00828e8e8686b000

                                          Static PE Info

                                          General

                                          Entrypoint:0x47e312
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                          Time Stamp:0x60A2331A [Mon May 17 09:10:50 2021 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:v4.0.30319
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                          Entrypoint Preview

                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          aas
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          aas
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          aas
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          aas
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al

                                          Data Directories

                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x7e2c00x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x800000x5a4.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x820000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                          Sections

                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x7c3980x7c400False0.84128010249data7.70438467215IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          .rsrc0x800000x5a40x600False0.416666666667data4.06990605525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x820000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                          Resources

                                          NameRVASizeTypeLanguageCountry
                                          RT_VERSION0x800900x314data
                                          RT_MANIFEST0x803b40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                          Imports

                                          DLLImport
                                          mscoree.dll_CorExeMain

                                          Version Infos

                                          DescriptionData
                                          Translation0x0000 0x04b0
                                          LegalCopyright
                                          Assembly Version1.0.0.0
                                          InternalNamek8qTx2Z.exe
                                          FileVersion1.0.0.0
                                          CompanyName
                                          LegalTrademarks
                                          Comments
                                          ProductNameGraphics Utility
                                          ProductVersion1.0.0.0
                                          FileDescriptionGraphics Utility
                                          OriginalFilenamek8qTx2Z.exe

                                          Network Behavior

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Jun 10, 2021 19:04:43.513456106 CEST4973254984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:04:46.515486956 CEST4973254984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:04:52.531589985 CEST4973254984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:05:02.174238920 CEST4974254984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:05:05.188992023 CEST4974254984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:05:11.205147982 CEST4974254984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:05:19.087956905 CEST4974354984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:05:22.096630096 CEST4974354984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:05:28.112893105 CEST4974354984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:05:51.741662979 CEST4975454984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:05:54.755695105 CEST4975454984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:06:00.756123066 CEST4975454984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:06:08.352464914 CEST4975554984192.168.2.3185.136.169.24
                                          Jun 10, 2021 19:06:11.366318941 CEST4975554984192.168.2.3185.136.169.24

                                          Code Manipulations

                                          Statistics

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:19:03:54
                                          Start date:10/06/2021
                                          Path:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\Desktop\7lQnHeq3XF.exe'
                                          Imagebase:0x230000
                                          File size:511488 bytes
                                          MD5 hash:9750DEE05B47F072E5975895DCF61AE5
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.298237654.00000000036C6000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.297181399.0000000003529000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          Reputation:low

                                          General

                                          Start time:19:04:35
                                          Start date:10/06/2021
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp6F2E.tmp'
                                          Imagebase:0x370000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:19:04:36
                                          Start date:10/06/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6b2800000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:19:04:37
                                          Start date:10/06/2021
                                          Path:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          Wow64 process (32bit):true
                                          Commandline:{path}
                                          Imagebase:0xec0000
                                          File size:511488 bytes
                                          MD5 hash:9750DEE05B47F072E5975895DCF61AE5
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.476199801.0000000003261000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.293449778.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.292982404.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.481846262.00000000042A9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.483716211.0000000005B90000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.470249000.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.483484770.0000000005930000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.483484770.0000000005930000.00000004.00000001.sdmp, Author: Florian Roth
                                          Reputation:low

                                          General

                                          Start time:19:04:40
                                          Start date:10/06/2021
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp8362.tmp'
                                          Imagebase:0x370000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:19:04:40
                                          Start date:10/06/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6b2800000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:19:04:42
                                          Start date:10/06/2021
                                          Path:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\7lQnHeq3XF.exe 0
                                          Imagebase:0x780000
                                          File size:511488 bytes
                                          MD5 hash:9750DEE05B47F072E5975895DCF61AE5
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.396832392.0000000003CE6000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000010.00000002.395146878.0000000002B8C000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.395816202.0000000003B49000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          Reputation:low

                                          General

                                          Start time:19:05:21
                                          Start date:10/06/2021
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CLJgKpOuw' /XML 'C:\Users\user\AppData\Local\Temp\tmp1E69.tmp'
                                          Imagebase:0xfb0000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:19:05:21
                                          Start date:10/06/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6b2800000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:19:05:22
                                          Start date:10/06/2021
                                          Path:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          Wow64 process (32bit):false
                                          Commandline:{path}
                                          Imagebase:0x300000
                                          File size:511488 bytes
                                          MD5 hash:9750DEE05B47F072E5975895DCF61AE5
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low

                                          General

                                          Start time:19:05:22
                                          Start date:10/06/2021
                                          Path:C:\Users\user\Desktop\7lQnHeq3XF.exe
                                          Wow64 process (32bit):true
                                          Commandline:{path}
                                          Imagebase:0x8a0000
                                          File size:511488 bytes
                                          MD5 hash:9750DEE05B47F072E5975895DCF61AE5
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.410604962.0000000003CB9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000018.00000000.391573162.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.409379306.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000018.00000000.390895301.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.410520702.0000000002CB1000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.410520702.0000000002CB1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                          Reputation:low

                                          Disassembly

                                          Code Analysis

                                          Reset < >