Loading ...

Play interactive tourEdit tour

Analysis Report OUTSTANDING INVOICE.pdf.scr

Overview

General Information

Sample Name:OUTSTANDING INVOICE.pdf.scr (renamed file extension from scr to exe)
Analysis ID:433312
MD5:416ccd703aff8844f0454e112f663c06
SHA1:1db05b7beda1a9e4fb0c4cd8e04c512c98efdf3c
SHA256:e1b2ca52707d724682e2c2618eb33899b019e8650e325e800e43e2042231f55d
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains very large array initializations
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Drops PE files to the document folder of the user
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • OUTSTANDING INVOICE.pdf.exe (PID: 6484 cmdline: 'C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe' MD5: 416CCD703AFF8844F0454E112F663C06)
    • windows update.exe (PID: 5072 cmdline: 'C:\Users\user\Documents\windows update.exe' MD5: 416CCD703AFF8844F0454E112F663C06)
  • windows update.exe (PID: 4552 cmdline: 'C:\Users\user\Documents\windows update.exe' MD5: 416CCD703AFF8844F0454E112F663C06)
    • InstallUtil.exe (PID: 6684 cmdline: C:\Users\user\AppData\Local\Temp\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • windows update.exe (PID: 4648 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 6548 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 4484 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 5472 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 5604 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 6460 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 4868 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 6648 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 6956 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 6820 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 4944 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 4672 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 1364 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 6128 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 684 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 4856 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 5504 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 5448 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 5796 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 6384 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 5664 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
      • windows update.exe (PID: 1316 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
    • windows update.exe (PID: 7076 cmdline: 'C:\Users\user\AppData\Local\Temp\windows update.exe' MD5: 0E362E7005823D0BEC3719B902ED6D62)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "e7a66d0e-8937-40e7-aaea-a267e5d3", "Group": "MAY 09 2021", "Domain1": "194.5.98.28", "Domain2": "brownhost22.ddns.net", "Port": 2021, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x10d8f:$x1: NanoCore.ClientPluginHost
    • 0x56b8d:$x1: NanoCore.ClientPluginHost
    • 0x10dcc:$x2: IClientNetworkHost
    • 0x56bca:$x2: IClientNetworkHost
    • 0x148ff:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x5a6fd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 32 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      6.2.windows update.exe.36d8222.5.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      6.2.windows update.exe.36d8222.5.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe105:$x1: NanoCore Client.exe
      • 0xe38d:$x2: NanoCore.ClientPluginHost
      • 0xf9c6:$s1: PluginCommand
      • 0xf9ba:$s2: FileCommand
      • 0x1086b:$s3: PipeExists
      • 0x16622:$s4: PipeCreated
      • 0xe3b7:$s5: IClientLoggingHost
      6.2.windows update.exe.36d8222.5.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        6.2.windows update.exe.36d8222.5.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xe0f5:$a: NanoCore
        • 0xe105:$a: NanoCore
        • 0xe339:$a: NanoCore
        • 0xe34d:$a: NanoCore
        • 0xe38d:$a: NanoCore
        • 0xe154:$b: ClientPlugin
        • 0xe356:$b: ClientPlugin
        • 0xe396:$b: ClientPlugin
        • 0xe27b:$c: ProjectData
        • 0xec82:$d: DESCrypto
        • 0x1664e:$e: KeepAlive
        • 0x1463c:$g: LogClientMessage
        • 0x10837:$i: get_Connected
        • 0xefb8:$j: #=q
        • 0xefe8:$j: #=q
        • 0xf004:$j: #=q
        • 0xf034:$j: #=q
        • 0xf050:$j: #=q
        • 0xf06c:$j: #=q
        • 0xf09c:$j: #=q
        • 0xf0b8:$j: #=q
        6.2.windows update.exe.37efa00.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        Click to see the 105 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 6684, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 6684, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary:

        barindex
        Sigma detected: Possible Applocker BypassShow sources
        Source: Process startedAuthor: juju4: Data: Command: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, CommandLine: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ParentCommandLine: 'C:\Users\user\Documents\windows update.exe' , ParentImage: C:\Users\user\Documents\windows update.exe, ParentProcessId: 4552, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 6684

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 6684, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 6684, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "e7a66d0e-8937-40e7-aaea-a267e5d3", "Group": "MAY 09 2021", "Domain1": "194.5.98.28", "Domain2": "brownhost22.ddns.net", "Port": 2021, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeMetadefender: Detection: 13%Perma Link
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeReversingLabs: Detection: 12%
        Source: C:\Users\user\Documents\windows update.exeReversingLabs: Detection: 51%
        Multi AV Scanner detection for submitted fileShow sources
        Source: OUTSTANDING INVOICE.pdf.exeVirustotal: Detection: 26%Perma Link
        Source: OUTSTANDING INVOICE.pdf.exeReversingLabs: Detection: 51%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: windows update.exe PID: 4552, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6684, type: MEMORY
        Source: Yara matchFile source: 6.2.windows update.exe.36d8222.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37efa00.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365b14e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.36d8222.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37efa00.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39c5403.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3692412.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37dc79b.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37a9c02.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3529510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365ff84.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365ff84.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.36645ad.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.700000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.InstallUtil.exe.700000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.36c4fab.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3adcbf3.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3692412.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.InstallUtil.exe.700000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37a9c02.8.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\Documents\windows update.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: OUTSTANDING INVOICE.pdf.exeJoe Sandbox ML: detected
        Source: 11.2.InstallUtil.exe.58b0000.10.unpackAvira: Label: TR/NanoCore.fadte
        Source: 11.2.InstallUtil.exe.700000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.0.InstallUtil.exe.700000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.0.InstallUtil.exe.700000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: OUTSTANDING INVOICE.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: OUTSTANDING INVOICE.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 0000000B.00000000.737451580.0000000000312000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
        Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, InstallUtil.exe.0.dr
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
        Source: C:\Users\user\Documents\windows update.exeCode function: 4x nop then jmp 0624CDCFh
        Source: C:\Users\user\Documents\windows update.exeCode function: 4x nop then jmp 0624E2F5h
        Source: C:\Users\user\Documents\windows update.exeCode function: 4x nop then jmp 0624CDCFh
        Source: C:\Users\user\Documents\windows update.exeCode function: 4x nop then jmp 0624E2F5h
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeCode function: 4x nop then jmp 01090799h
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeCode function: 4x nop then jmp 01090799h
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeCode function: 4x nop then jmp 00AD0799h
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeCode function: 4x nop then jmp 00AD0799h

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: brownhost22.ddns.net
        Source: Malware configuration extractorURLs: 194.5.98.28
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: brownhost22.ddns.net
        Source: global trafficTCP traffic: 192.168.2.4:49765 -> 194.5.98.28:2021
        Source: Joe Sandbox ViewIP Address: 194.5.98.28 194.5.98.28
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: unknownDNS traffic detected: queries for: brownhost22.ddns.net
        Source: windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696754008.000000000284F000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
        Source: windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
        Source: windows update.exe, 00000005.00000002.714927650.0000000002E24000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
        Source: windows update.exe, 00000005.00000002.714927650.0000000002E24000.00000004.00000001.sdmpString found in binary or memory: http://dual-a-0001.a-msedge.net
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.663994887.0000000006C26000.00000004.00000001.sdmp, OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.695725968.0000000006C2D000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.663994887.0000000006C26000.00000004.00000001.sdmp, OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.695725968.0000000006C2D000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g
        Source: windows update.exe, 00000006.00000003.722676487.00000000068A6000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/gMa
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.663994887.0000000006C26000.00000004.00000001.sdmp, OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.695725968.0000000006C2D000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobj
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.661817036.0000000006C26000.00000004.00000001.sdmpString found in binary or memory: http://ns.d
        Source: windows update.exe, 00000005.00000002.714927650.0000000002E24000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696816747.000000000287D000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.714927650.0000000002E24000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.msocsp.com0
        Source: windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696754008.000000000284F000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696754008.000000000284F000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696795598.0000000002866000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.714839160.0000000002DF1000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923367629.000000000254E000.00000004.00000001.sdmpString found in binary or memory: http://schema.org/WebPage
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696715422.0000000002821000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.713721843.0000000002AA1000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923086971.0000000002521000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: windows update.exe, 00000005.00000002.714839160.0000000002DF1000.00000004.00000001.sdmpString found in binary or memory: http://www.google.com
        Source: windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpString found in binary or memory: https://pki.goog/repository/0
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696795598.0000000002866000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.714839160.0000000002DF1000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923367629.000000000254E000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923453182.0000000002565000.00000004.00000001.sdmpString found in binary or memory: https://www.google.
        Source: windows update.exe, 00000005.00000002.714839160.0000000002DF1000.00000004.00000001.sdmpString found in binary or memory: https://www.google.$
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696715422.0000000002821000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.713721843.0000000002AA1000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923086971.0000000002521000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696715422.0000000002821000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.713721843.0000000002AA1000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923086971.0000000002521000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/
        Source: windows update.exe, 00000005.00000002.714809706.0000000002DE8000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com4Wk2
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696754008.000000000284F000.00000004.00000001.sdmpString found in binary or memory: https://www.google.h
        Source: windows update.exe, 00000006.00000002.923367629.000000000254E000.00000004.00000001.sdmpString found in binary or memory: https://www.google.imag
        Source: windows update.exe, 0000000C.00000002.758894350.0000000000E18000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: InstallUtil.exe, 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: windows update.exe PID: 4552, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6684, type: MEMORY
        Source: Yara matchFile source: 6.2.windows update.exe.36d8222.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37efa00.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365b14e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.36d8222.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37efa00.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39c5403.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3692412.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37dc79b.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37a9c02.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3529510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365ff84.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365ff84.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.36645ad.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.700000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.InstallUtil.exe.700000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.36c4fab.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3adcbf3.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3692412.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.InstallUtil.exe.700000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37a9c02.8.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.929762962.0000000004FE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: windows update.exe PID: 4552, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: windows update.exe PID: 4552, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: InstallUtil.exe PID: 6684, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: InstallUtil.exe PID: 6684, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.36d8222.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.36d8222.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.37efa00.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.37efa00.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.InstallUtil.exe.365b14e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.InstallUtil.exe.365b14e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.36d8222.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.36d8222.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.InstallUtil.exe.4fe0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.37efa00.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.37efa00.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.InstallUtil.exe.58b4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39c5403.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39c5403.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.3692412.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.3692412.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.37dc79b.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.37dc79b.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.37a9c02.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.37a9c02.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.3529510.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.3529510.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.InstallUtil.exe.365ff84.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.InstallUtil.exe.365ff84.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.InstallUtil.exe.58b0000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.InstallUtil.exe.2666040.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.InstallUtil.exe.36645ad.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.InstallUtil.exe.700000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.InstallUtil.exe.700000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.InstallUtil.exe.700000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.InstallUtil.exe.700000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.36c4fab.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.36c4fab.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3adcbf3.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3adcbf3.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.3692412.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.3692412.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.InstallUtil.exe.58b0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.InstallUtil.exe.700000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.InstallUtil.exe.700000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.windows update.exe.37a9c02.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.windows update.exe.37a9c02.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        .NET source code contains very large array initializationsShow sources
        Source: OUTSTANDING INVOICE.pdf.exe, q9S/Lc5.csLarge array initialization: .cctor: array initializer size 3852
        Source: windows update.exe.0.dr, q9S/Lc5.csLarge array initialization: .cctor: array initializer size 3852
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.4e0000.0.unpack, q9S/Lc5.csLarge array initialization: .cctor: array initializer size 3852
        Source: 0.0.OUTSTANDING INVOICE.pdf.exe.4e0000.0.unpack, q9S/Lc5.csLarge array initialization: .cctor: array initializer size 3852
        Source: 5.0.windows update.exe.740000.0.unpack, q9S/Lc5.csLarge array initialization: .cctor: array initializer size 3852
        Source: 5.2.windows update.exe.740000.0.unpack, q9S/Lc5.csLarge array initialization: .cctor: array initializer size 3852
        Source: 6.0.windows update.exe.c0000.0.unpack, q9S/Lc5.csLarge array initialization: .cctor: array initializer size 3852
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: OUTSTANDING INVOICE.pdf.exe
        Source: initial sampleStatic PE information: Filename: OUTSTANDING INVOICE.pdf.exe
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_06241AFC CreateProcessAsUserW,
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_00DBEE70
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_00DBD308
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_070F1118
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_070F1113
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_070F0023
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_070F0040
        Source: C:\Users\user\Documents\windows update.exeCode function: 5_2_02A5EE70
        Source: C:\Users\user\Documents\windows update.exeCode function: 5_2_02A5D308
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_00B7EE70
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_00B7D308
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_0624A6E9
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_06241EC0
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_06245ED1
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_062457AE
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_06243CE0
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_062429B7
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_062411F0
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_06247DF9
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_0624B318
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_062488E0
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_06247148
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_06247158
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_062495A0
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_062475C0
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_062475D0
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 11_2_003120B0
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 11_2_024CE471
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 11_2_024CE480
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 11_2_024CBBD4
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\InstallUtil.exe 46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\windows update.exe 2D0DC6216F613AC7551A7E70A798C22AEE8EB9819428B1357E2B8C73BEF905AD
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.701321031.0000000006410000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs OUTSTANDING INVOICE.pdf.exe
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.702071465.0000000007100000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs OUTSTANDING INVOICE.pdf.exe
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.697271627.0000000002A8B000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAstronot plart.exe> vs OUTSTANDING INVOICE.pdf.exe
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.702234051.00000000071F0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs OUTSTANDING INVOICE.pdf.exe
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.702234051.00000000071F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs OUTSTANDING INVOICE.pdf.exe
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.700463444.00000000059A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs OUTSTANDING INVOICE.pdf.exe
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.695985058.000000000059A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAdobe Download ManagerN vs OUTSTANDING INVOICE.pdf.exe
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.701529245.0000000006710000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs OUTSTANDING INVOICE.pdf.exe
        Source: OUTSTANDING INVOICE.pdf.exeBinary or memory string: OriginalFilenameAdobe Download ManagerN vs OUTSTANDING INVOICE.pdf.exe
        Source: OUTSTANDING INVOICE.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.929762962.0000000004FE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.929762962.0000000004FE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: windows update.exe PID: 4552, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: windows update.exe PID: 4552, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: InstallUtil.exe PID: 6684, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: InstallUtil.exe PID: 6684, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.36d8222.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.36d8222.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.36d8222.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.37efa00.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.37efa00.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.37efa00.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.InstallUtil.exe.365b14e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.365b14e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.InstallUtil.exe.365b14e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.36d8222.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.36d8222.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.36d8222.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.InstallUtil.exe.4fe0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.4fe0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.37efa00.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.37efa00.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.37efa00.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.InstallUtil.exe.58b4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.58b4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39c5403.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39c5403.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.3692412.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.3692412.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.3692412.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.37dc79b.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.37dc79b.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.37dc79b.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.37a9c02.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.37a9c02.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.37a9c02.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.3529510.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.3529510.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.3529510.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.InstallUtil.exe.365ff84.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.365ff84.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.InstallUtil.exe.365ff84.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.365ff84.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.InstallUtil.exe.58b0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.58b0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.InstallUtil.exe.2666040.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.2666040.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.InstallUtil.exe.36645ad.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.36645ad.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.InstallUtil.exe.700000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.700000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.InstallUtil.exe.700000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.InstallUtil.exe.700000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.InstallUtil.exe.700000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.0.InstallUtil.exe.700000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.36c4fab.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.36c4fab.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3adcbf3.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3adcbf3.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.3adcbf3.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.3692412.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.3692412.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.InstallUtil.exe.58b0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.InstallUtil.exe.58b0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.0.InstallUtil.exe.700000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.InstallUtil.exe.700000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.0.InstallUtil.exe.700000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.windows update.exe.37a9c02.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.windows update.exe.37a9c02.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.windows update.exe.37a9c02.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: classification engineClassification label: mal100.troj.evad.winEXE@54/32@8/2
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows update.lnkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{e7a66d0e-8937-40e7-aaea-a267e5d3f96b}
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
        Source: OUTSTANDING INVOICE.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Documents\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Documents\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Documents\windows update.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Documents\windows update.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Documents\windows update.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Documents\windows update.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Documents\windows update.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Documents\windows update.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: OUTSTANDING INVOICE.pdf.exeVirustotal: Detection: 26%
        Source: OUTSTANDING INVOICE.pdf.exeReversingLabs: Detection: 51%
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile read: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe 'C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe'
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess created: C:\Users\user\Documents\windows update.exe 'C:\Users\user\Documents\windows update.exe'
        Source: unknownProcess created: C:\Users\user\Documents\windows update.exe 'C:\Users\user\Documents\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess created: C:\Users\user\Documents\windows update.exe 'C:\Users\user\Documents\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: unknown unknown
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: unknown unknown
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: OUTSTANDING INVOICE.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: OUTSTANDING INVOICE.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 0000000B.00000000.737451580.0000000000312000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
        Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, InstallUtil.exe.0.dr
        Source: windows update.exe.6.drStatic PE information: 0xC7142059 [Sun Nov 3 05:36:25 2075 UTC]
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_004E3F02 push ss; retf
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_004E24C4 pushfd ; ret
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_004E3F9F push ss; retf
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeCode function: 0_2_004E3C9C push 704C7DF1h; ret
        Source: C:\Users\user\Documents\windows update.exeCode function: 5_2_00743F02 push ss; retf
        Source: C:\Users\user\Documents\windows update.exeCode function: 5_2_007424C4 pushfd ; ret
        Source: C:\Users\user\Documents\windows update.exeCode function: 5_2_00743C9C push 704C7DF1h; ret
        Source: C:\Users\user\Documents\windows update.exeCode function: 5_2_00743F9F push ss; retf
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_000C3F02 push ss; retf
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_000C3C9C push 704C7DF1h; ret
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_000C3F9F push ss; retf
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_000C24C4 pushfd ; ret
        Source: C:\Users\user\Documents\windows update.exeCode function: 6_2_06170001 push es; retf
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 11_2_024CC8D9 push edx; retf
        Source: OUTSTANDING INVOICE.pdf.exe, Tn2i/Ta0o.csHigh entropy of concatenated method names: '.ctor', 'f4C1', 'Zt08', 'Tm78', 'r3L7', 'Rg14', 'Ae21', 'd1C5', 'y8DC', 'p0L2'
        Source: OUTSTANDING INVOICE.pdf.exe, d6G4/y8JZ.csHigh entropy of concatenated method names: '.ctor', 'Ge70', 'Hy45', 'z1WN', 'p6G7', 'Qs9d', 'Lz79', 'Qd81', 'Gz73', 'Bg18'
        Source: windows update.exe.0.dr, Tn2i/Ta0o.csHigh entropy of concatenated method names: '.ctor', 'f4C1', 'Zt08', 'Tm78', 'r3L7', 'Rg14', 'Ae21', 'd1C5', 'y8DC', 'p0L2'
        Source: windows update.exe.0.dr, d6G4/y8JZ.csHigh entropy of concatenated method names: '.ctor', 'Ge70', 'Hy45', 'z1WN', 'p6G7', 'Qs9d', 'Lz79', 'Qd81', 'Gz73', 'Bg18'
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.4e0000.0.unpack, Tn2i/Ta0o.csHigh entropy of concatenated method names: '.ctor', 'f4C1', 'Zt08', 'Tm78', 'r3L7', 'Rg14', 'Ae21', 'd1C5', 'y8DC', 'p0L2'
        Source: 0.2.OUTSTANDING INVOICE.pdf.exe.4e0000.0.unpack, d6G4/y8JZ.csHigh entropy of concatenated method names: '.ctor', 'Ge70', 'Hy45', 'z1WN', 'p6G7', 'Qs9d', 'Lz79', 'Qd81', 'Gz73', 'Bg18'
        Source: 0.0.OUTSTANDING INVOICE.pdf.exe.4e0000.0.unpack, Tn2i/Ta0o.csHigh entropy of concatenated method names: '.ctor', 'f4C1', 'Zt08', 'Tm78', 'r3L7', 'Rg14', 'Ae21', 'd1C5', 'y8DC', 'p0L2'
        Source: 0.0.OUTSTANDING INVOICE.pdf.exe.4e0000.0.unpack, d6G4/y8JZ.csHigh entropy of concatenated method names: '.ctor', 'Ge70', 'Hy45', 'z1WN', 'p6G7', 'Qs9d', 'Lz79', 'Qd81', 'Gz73', 'Bg18'
        Source: 5.0.windows update.exe.740000.0.unpack, Tn2i/Ta0o.csHigh entropy of concatenated method names: '.ctor', 'f4C1', 'Zt08', 'Tm78', 'r3L7', 'Rg14', 'Ae21', 'd1C5', 'y8DC', 'p0L2'
        Source: 5.0.windows update.exe.740000.0.unpack, d6G4/y8JZ.csHigh entropy of concatenated method names: '.ctor', 'Ge70', 'Hy45', 'z1WN', 'p6G7', 'Qs9d', 'Lz79', 'Qd81', 'Gz73', 'Bg18'
        Source: 5.2.windows update.exe.740000.0.unpack, Tn2i/Ta0o.csHigh entropy of concatenated method names: '.ctor', 'f4C1', 'Zt08', 'Tm78', 'r3L7', 'Rg14', 'Ae21', 'd1C5', 'y8DC', 'p0L2'
        Source: 5.2.windows update.exe.740000.0.unpack, d6G4/y8JZ.csHigh entropy of concatenated method names: '.ctor', 'Ge70', 'Hy45', 'z1WN', 'p6G7', 'Qs9d', 'Lz79', 'Qd81', 'Gz73', 'Bg18'
        Source: windows update.exe.6.dr, Astronotplart/My/tT7bk4FnxbYaKqMtWjIqvyKWh4J9tkfAvLZ8e5Y4BU.csHigh entropy of concatenated method names: 'nn9DM7TZkpnl4dSPqnpPS2oW', 'LztRLhG61h4KFshxtO7P7', 'G4vjdlUHNvtWZenTXSNdtGwCIYmCoKE77', '5fQycwGNtn0lBuMB2jteITZhMQF3wG', 'ZJSZEAUpgBzwUgSXvnbC6lEhXmP5VpN2nCiGvnzMTR'
        Source: windows update.exe.6.dr, Astronotplart/gabKErPURPS76kDKjrme.csHigh entropy of concatenated method names: '.ctor', 'EmwYECB1wGyvIA2snT', 'zQyq6GQCkVXH2m9ORWKDS7znEfc2l', 'X3TE6RCIZMD7ECwwVoqD8j43J8u', 'SwV7wVQkM24hXoCSpr83uLH4TEFtSUXME6LQS7', 'gIglw7CqsSJGzE2AtTN3JYbIYwYS1QQ7ADpw', 'aciMX0Q3f70STq8WXW'
        Source: windows update.exe.6.dr, Astronotplart/My/nVdeDLHvVsfVxwgFzORDky8W3f9u4lGmiaWnSDb.csHigh entropy of concatenated method names: '.cctor', 'ipfF6OV8JHE8Qin24Sz2H', 'GBAU51HdoykwtyLJ8j', 'A6Cmw4VPbNKHMkR6BnXqjGTCsaLYYK', 'ZhXAveIVREq8oAgNFODqxTnhx35', 'TL13XiWxESQiImm09SkPUl2iIyfqvqfNa1eW0WN', 'hXlgWtIDkKwHkCLRcj1P0yvWMryPDm997zSDv', 'crnIowWf8YVTDoRdGn'
        Source: windows update.exe.6.dr, Astronotplart/rtGPmvPIdl5IaacYtOxDvUDj4cyvAKDSBQSIKnjuJ.csHigh entropy of concatenated method names: '.ctor', 'lXIhNy5k2zuUtWijXRf3Smh', 'K04wNKQqGraj7cH31jV3', 'XjtDF35KWLF6l1is3R1Q6HxEJwEr3PbjtGbh2HVd2', 'lvOSFdRQCCluXgGa7jGQkU1jNoXRaK5EpfPYnW', 'gZQk7h6spRLFg3NwAmoe'
        Source: windows update.exe.6.dr, Astronotplart/My/Resources/cZsjfbJLI2Nt8If5QOa3YzSXxDXbcmzUTY.csHigh entropy of concatenated method names: '7tuLHfXnvgcErulp', 'vFPZGqKub8S44KK9njyrAe1CN2qDJ3IQa7tiGW3Oebu', 'p0Rr9tY6YlifmwQtRmfPXGEDX', 'IPf8zIYNrroPiylxpRDezmMidW58Fr8mLO'
        Source: 6.0.windows update.exe.c0000.0.unpack, Tn2i/Ta0o.csHigh entropy of concatenated method names: '.ctor', 'f4C1', 'Zt08', 'Tm78', 'r3L7', 'Rg14', 'Ae21', 'd1C5', 'y8DC', 'p0L2'
        Source: 6.0.windows update.exe.c0000.0.unpack, d6G4/y8JZ.csHigh entropy of concatenated method names: '.ctor', 'Ge70', 'Hy45', 'z1WN', 'p6G7', 'Qs9d', 'Lz79', 'Qd81', 'Gz73', 'Bg18'

        Persistence and Installation Behavior:

        barindex
        Drops PE files to the document folder of the userShow sources
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile created: C:\Users\user\Documents\windows update.exeJump to dropped file
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile created: C:\Users\user\Documents\windows update.exeJump to dropped file
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
        Source: C:\Users\user\Documents\windows update.exeFile created: C:\Users\user\AppData\Local\Temp\windows update.exeJump to dropped file
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows update.lnkJump to behavior
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows update.lnkJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeFile opened: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe\:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Documents\windows update.exeFile opened: C:\Users\user\Documents\windows update.exe\:Zone.Identifier read attributes | delete
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Temp\InstallUtil.exe:Zone.Identifier read attributes | delete
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.exeStatic PE information: OUTSTANDING INVOICE.pdf.exe
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Documents\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Documents\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Documents\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Documents\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeWindow / User API: threadDelayed 536
        Source: C:\Users\user\Documents\windows update.exeWindow / User API: threadDelayed 356
        Source: C:\Users\user\Documents\windows update.exeWindow / User API: threadDelayed 4391
        Source: C:\Users\user\Documents\windows update.exeWindow / User API: threadDelayed 4836
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 3008
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 6572
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: foregroundWindowGot 619
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe TID: 5748Thread sleep time: -3689348814741908s >= -30000s
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe TID: 1380Thread sleep count: 536 > 30
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe TID: 5808Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe TID: 3296Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Documents\windows update.exe TID: 6588Thread sleep time: -3689348814741908s >= -30000s
        Source: C:\Users\user\Documents\windows update.exe TID: 6076Thread sleep count: 356 > 30
        Source: C:\Users\user\Documents\windows update.exe TID: 4584Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\Documents\windows update.exe TID: 6920Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Documents\windows update.exe TID: 5740Thread sleep time: -22136092888451448s >= -30000s
        Source: C:\Users\user\Documents\windows update.exe TID: 6220Thread sleep count: 4391 > 30
        Source: C:\Users\user\Documents\windows update.exe TID: 6220Thread sleep count: 4836 > 30
        Source: C:\Users\user\Documents\windows update.exe TID: 5780Thread sleep count: 34 > 30
        Source: C:\Users\user\Documents\windows update.exe TID: 5780Thread sleep time: -34000s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 6656Thread sleep time: -11068046444225724s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 6928Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 5856Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 5620Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 1472Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 4600Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 5340Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 6428Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 6516Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 5460Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 7136Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 6520Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\windows update.exe TID: 6928Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Documents\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Documents\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Documents\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeThread delayed: delay time: 922337203685477
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.700463444.00000000059A0000.00000002.00000001.sdmp, windows update.exe, 00000005.00000002.718930108.0000000005B10000.00000002.00000001.sdmp, InstallUtil.exe, 0000000B.00000002.930717255.0000000006180000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: windows update.exe, 0000000F.00000002.771517383.00000000011BC000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\{f<Z
        Source: windows update.exe, 0000000F.00000002.771517383.00000000011BC000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}oy
        Source: OUTSTANDING INVOICE.pdf.exeBinary or memory string: Dk/mhgfsdcb
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.700463444.00000000059A0000.00000002.00000001.sdmp, windows update.exe, 00000005.00000002.718930108.0000000005B10000.00000002.00000001.sdmp, InstallUtil.exe, 0000000B.00000002.930717255.0000000006180000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.700463444.00000000059A0000.00000002.00000001.sdmp, windows update.exe, 00000005.00000002.718930108.0000000005B10000.00000002.00000001.sdmp, InstallUtil.exe, 0000000B.00000002.930717255.0000000006180000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: windows update.exe, 00000005.00000002.713343664.0000000000D03000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlligurn4Zx>
        Source: windows update.exe, 00000016.00000002.798658964.0000000001234000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: InstallUtil.exe, 0000000B.00000003.812584282.00000000009EC000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.700463444.00000000059A0000.00000002.00000001.sdmp, windows update.exe, 00000005.00000002.718930108.0000000005B10000.00000002.00000001.sdmp, InstallUtil.exe, 0000000B.00000002.930717255.0000000006180000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess token adjusted: Debug
        Source: C:\Users\user\Documents\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\Documents\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\Documents\windows update.exeMemory allocated: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 700000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Documents\windows update.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 700000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Documents\windows update.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 700000
        Source: C:\Users\user\Documents\windows update.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 702000
        Source: C:\Users\user\Documents\windows update.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 720000
        Source: C:\Users\user\Documents\windows update.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 722000
        Source: C:\Users\user\Documents\windows update.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 45A008
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeProcess created: C:\Users\user\Documents\windows update.exe 'C:\Users\user\Documents\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\Documents\windows update.exeProcess created: unknown unknown
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: C:\Users\user\AppData\Local\Temp\windows update.exe 'C:\Users\user\AppData\Local\Temp\windows update.exe'
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeProcess created: unknown unknown
        Source: windows update.exe, 00000006.00000002.922306110.0000000000F20000.00000002.00000001.sdmp, InstallUtil.exe, 0000000B.00000002.930699068.000000000617C000.00000004.00000001.sdmp, windows update.exe, 0000000D.00000002.916897577.0000000000E80000.00000002.00000001.sdmp, windows update.exe, 00000011.00000002.920296404.00000000018F0000.00000002.00000001.sdmp, windows update.exe, 00000014.00000002.917181684.0000000001590000.00000002.00000001.sdmp, windows update.exe, 00000017.00000002.920897775.00000000012F0000.00000002.00000001.sdmp, windows update.exe, 00000019.00000002.918844745.00000000012E0000.00000002.00000001.sdmp, windows update.exe, 0000001B.00000002.920762051.0000000001C90000.00000002.00000001.sdmp, windows update.exe, 0000001D.00000002.920760464.0000000001880000.00000002.00000001.sdmp, windows update.exe, 00000020.00000002.918144621.0000000001070000.00000002.00000001.sdmp, windows update.exe, 00000022.00000002.917058067.0000000001B40000.00000002.00000001.sdmp, windows update.exe, 00000024.00000002.918146023.00000000012C0000.00000002.00000001.sdmp, windows update.exe, 00000026.00000002.921010207.0000000001AD0000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: windows update.exe, 00000006.00000002.922306110.0000000000F20000.00000002.00000001.sdmp, InstallUtil.exe, 0000000B.00000002.919959970.0000000001070000.00000002.00000001.sdmp, windows update.exe, 0000000D.00000002.916897577.0000000000E80000.00000002.00000001.sdmp, windows update.exe, 00000011.00000002.920296404.00000000018F0000.00000002.00000001.sdmp, windows update.exe, 00000014.00000002.917181684.0000000001590000.00000002.00000001.sdmp, windows update.exe, 00000017.00000002.920897775.00000000012F0000.00000002.00000001.sdmp, windows update.exe, 00000019.00000002.918844745.00000000012E0000.00000002.00000001.sdmp, windows update.exe, 0000001B.00000002.920762051.0000000001C90000.00000002.00000001.sdmp, windows update.exe, 0000001D.00000002.920760464.0000000001880000.00000002.00000001.sdmp, windows update.exe, 00000020.00000002.918144621.0000000001070000.00000002.00000001.sdmp, windows update.exe, 00000022.00000002.917058067.0000000001B40000.00000002.00000001.sdmp, windows update.exe, 00000024.00000002.918146023.00000000012C0000.00000002.00000001.sdmp, windows update.exe, 00000026.00000002.921010207.0000000001AD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: windows update.exe, 00000006.00000002.922306110.0000000000F20000.00000002.00000001.sdmp, InstallUtil.exe, 0000000B.00000002.919959970.0000000001070000.00000002.00000001.sdmp, windows update.exe, 0000000D.00000002.916897577.0000000000E80000.00000002.00000001.sdmp, windows update.exe, 00000011.00000002.920296404.00000000018F0000.00000002.00000001.sdmp, windows update.exe, 00000014.00000002.917181684.0000000001590000.00000002.00000001.sdmp, windows update.exe, 00000017.00000002.920897775.00000000012F0000.00000002.00000001.sdmp, windows update.exe, 00000019.00000002.918844745.00000000012E0000.00000002.00000001.sdmp, windows update.exe, 0000001B.00000002.920762051.0000000001C90000.00000002.00000001.sdmp, windows update.exe, 0000001D.00000002.920760464.0000000001880000.00000002.00000001.sdmp, windows update.exe, 00000020.00000002.918144621.0000000001070000.00000002.00000001.sdmp, windows update.exe, 00000022.00000002.917058067.0000000001B40000.00000002.00000001.sdmp, windows update.exe, 00000024.00000002.918146023.00000000012C0000.00000002.00000001.sdmp, windows update.exe, 00000026.00000002.921010207.0000000001AD0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: InstallUtil.exe, 0000000B.00000002.931247033.00000000063AD000.00000004.00000001.sdmpBinary or memory string: Program Manager 4L
        Source: InstallUtil.exe, 0000000B.00000002.922259548.00000000026EA000.00000004.00000001.sdmpBinary or memory string: Program Manager|$
        Source: windows update.exe, 00000006.00000002.922306110.0000000000F20000.00000002.00000001.sdmp, InstallUtil.exe, 0000000B.00000002.919959970.0000000001070000.00000002.00000001.sdmp, windows update.exe, 0000000D.00000002.916897577.0000000000E80000.00000002.00000001.sdmp, windows update.exe, 00000011.00000002.920296404.00000000018F0000.00000002.00000001.sdmp, windows update.exe, 00000014.00000002.917181684.0000000001590000.00000002.00000001.sdmp, windows update.exe, 00000017.00000002.920897775.00000000012F0000.00000002.00000001.sdmp, windows update.exe, 00000019.00000002.918844745.00000000012E0000.00000002.00000001.sdmp, windows update.exe, 0000001B.00000002.920762051.0000000001C90000.00000002.00000001.sdmp, windows update.exe, 0000001D.00000002.920760464.0000000001880000.00000002.00000001.sdmp, windows update.exe, 00000020.00000002.918144621.0000000001070000.00000002.00000001.sdmp, windows update.exe, 00000022.00000002.917058067.0000000001B40000.00000002.00000001.sdmp, windows update.exe, 00000024.00000002.918146023.00000000012C0000.00000002.00000001.sdmp, windows update.exe, 00000026.00000002.921010207.0000000001AD0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: InstallUtil.exe, 0000000B.00000002.930568254.0000000005C6D000.00000004.00000001.sdmpBinary or memory string: Program Managert
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeQueries volume information: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe VolumeInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Users\user\Documents\windows update.exe VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Users\user\Documents\windows update.exe VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Documents\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Users\user\AppData\Local\Temp\InstallUtil.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windows update.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\windows update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: windows update.exe PID: 4552, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6684, type: MEMORY
        Source: Yara matchFile source: 6.2.windows update.exe.36d8222.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37efa00.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365b14e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.36d8222.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37efa00.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39c5403.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3692412.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37dc79b.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37a9c02.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3529510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365ff84.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365ff84.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.36645ad.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.700000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.InstallUtil.exe.700000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.36c4fab.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3adcbf3.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3692412.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.InstallUtil.exe.700000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37a9c02.8.raw.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exeDirectory queried: C:\Users\user\Documents

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: windows update.exe, 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: InstallUtil.exe, 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: InstallUtil.exe, 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: windows update.exe PID: 4552, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6684, type: MEMORY
        Source: Yara matchFile source: 6.2.windows update.exe.36d8222.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37efa00.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365b14e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.36d8222.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37efa00.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3aefe58.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39c5403.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.39d867a.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3692412.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37dc79b.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37a9c02.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3529510.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365ff84.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.365ff84.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.36645ad.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.700000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.InstallUtil.exe.700000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.36c4fab.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.3adcbf3.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.3692412.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.InstallUtil.exe.58b0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.InstallUtil.exe.700000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.OUTSTANDING INVOICE.pdf.exe.399286a.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.windows update.exe.37a9c02.8.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1Windows Management InstrumentationStartup Items1Startup Items1Disable or Modify Tools1Input Capture21File and Directory Discovery11Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobValid Accounts1Valid Accounts1Obfuscated Files or Information12LSASS MemorySystem Information Discovery12Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Registry Run Keys / Startup Folder2Access Token Manipulation1Software Packing1Security Account ManagerQuery Registry1SMB/Windows Admin SharesInput Capture21Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Process Injection312Timestomp1NTDSSecurity Software Discovery111Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptRegistry Run Keys / Startup Folder2Masquerading11LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonValid Accounts1Cached Domain CredentialsVirtualization/Sandbox Evasion31VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion31Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection312/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 433312 Sample: OUTSTANDING INVOICE.pdf.scr Startdate: 11/06/2021 Architecture: WINDOWS Score: 100 52 brownhost22.ddns.net 2->52 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 Multi AV Scanner detection for dropped file 2->64 66 12 other signatures 2->66 8 windows update.exe 5 2->8         started        12 OUTSTANDING INVOICE.pdf.exe 15 8 2->12         started        signatures3 process4 dnsIp5 42 C:\Users\user\AppData\...\windows update.exe, PE32 8->42 dropped 68 Writes to foreign memory regions 8->68 70 Allocates memory in foreign processes 8->70 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->72 74 Injects a PE file into a foreign processes 8->74 15 InstallUtil.exe 6 8->15         started        20 windows update.exe 8->20         started        22 windows update.exe 8->22         started        26 10 other processes 8->26 54 192.168.2.1 unknown unknown 12->54 44 C:\Users\user\Documents\windows update.exe, PE32 12->44 dropped 46 C:\Users\user\AppData\...\InstallUtil.exe, PE32 12->46 dropped 48 C:\...\windows update.exe:Zone.Identifier, ASCII 12->48 dropped 50 C:\Users\...\OUTSTANDING INVOICE.pdf.exe.log, ASCII 12->50 dropped 24 windows update.exe 14 3 12->24         started        file6 signatures7 process8 dnsIp9 56 brownhost22.ddns.net 194.5.98.28, 2021, 49765, 49766 DANILENKODE Netherlands 15->56 40 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 15->40 dropped 58 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->58 28 windows update.exe 20->28         started        30 windows update.exe 22->30         started        32 windows update.exe 26->32         started        34 windows update.exe 26->34         started        36 windows update.exe 26->36         started        38 6 other processes 26->38 file10 signatures11 process12

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        OUTSTANDING INVOICE.pdf.exe26%VirustotalBrowse
        OUTSTANDING INVOICE.pdf.exe52%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
        OUTSTANDING INVOICE.pdf.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\Documents\windows update.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
        C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\windows update.exe14%MetadefenderBrowse
        C:\Users\user\AppData\Local\Temp\windows update.exe13%ReversingLabs
        C:\Users\user\Documents\windows update.exe52%ReversingLabsByteCode-MSIL.Backdoor.NanoBot

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        11.2.InstallUtil.exe.58b0000.10.unpack100%AviraTR/NanoCore.fadteDownload File
        11.2.InstallUtil.exe.700000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.0.InstallUtil.exe.700000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.0.InstallUtil.exe.700000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        SourceDetectionScannerLabelLink
        brownhost22.ddns.net1%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        https://www.google.0%URL Reputationsafe
        https://www.google.0%URL Reputationsafe
        https://www.google.0%URL Reputationsafe
        https://www.google.0%URL Reputationsafe
        http://ns.adobe.cobj0%URL Reputationsafe
        http://ns.adobe.cobj0%URL Reputationsafe
        http://ns.adobe.cobj0%URL Reputationsafe
        http://ns.adobe.cobj0%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://ns.adobe.c/gMa0%Avira URL Cloudsafe
        brownhost22.ddns.net1%VirustotalBrowse
        brownhost22.ddns.net0%Avira URL Cloudsafe
        http://ns.d0%Avira URL Cloudsafe
        https://www.google.h0%Avira URL Cloudsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        https://www.google.imag0%Avira URL Cloudsafe
        http://ns.adobe.c/g0%URL Reputationsafe
        http://ns.adobe.c/g0%URL Reputationsafe
        http://ns.adobe.c/g0%URL Reputationsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        194.5.98.280%Avira URL Cloudsafe
        https://www.google.$0%Avira URL Cloudsafe
        http://ns.ado/10%URL Reputationsafe
        http://ns.ado/10%URL Reputationsafe
        http://ns.ado/10%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        brownhost22.ddns.net
        194.5.98.28
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        brownhost22.ddns.nettrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        194.5.98.28true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        https://www.google.OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696795598.0000000002866000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.714839160.0000000002DF1000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923367629.000000000254E000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923453182.0000000002565000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ns.adobe.cobjOUTSTANDING INVOICE.pdf.exe, 00000000.00000003.663994887.0000000006C26000.00000004.00000001.sdmp, OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.695725968.0000000006C2D000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://crl.pki.goog/GTS1O1core.crl0OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696754008.000000000284F000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ns.adobe.c/gMawindows update.exe, 00000006.00000003.722676487.00000000068A6000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://ns.dOUTSTANDING INVOICE.pdf.exe, 00000000.00000003.661817036.0000000006C26000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://www.google.hOUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696754008.000000000284F000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://pki.goog/gsr2/GTS1O1.crt0OUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696754008.000000000284F000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        https://www.google.imagwindows update.exe, 00000006.00000002.923367629.000000000254E000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://ns.adobe.c/gOUTSTANDING INVOICE.pdf.exe, 00000000.00000003.663994887.0000000006C26000.00000004.00000001.sdmp, OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.695725968.0000000006C2D000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://crl.pki.goog/gsr2/gsr2.crl0?windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        https://pki.goog/repository/0windows update.exe, 00000005.00000002.713354180.0000000000D12000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696715422.0000000002821000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.713721843.0000000002AA1000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923086971.0000000002521000.00000004.00000001.sdmpfalse
          high
          http://schema.org/WebPageOUTSTANDING INVOICE.pdf.exe, 00000000.00000002.696795598.0000000002866000.00000004.00000001.sdmp, windows update.exe, 00000005.00000002.714839160.0000000002DF1000.00000004.00000001.sdmp, windows update.exe, 00000006.00000002.923367629.000000000254E000.00000004.00000001.sdmpfalse
            high
            https://www.google.$windows update.exe, 00000005.00000002.714839160.0000000002DF1000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://ns.ado/1OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.663994887.0000000006C26000.00000004.00000001.sdmp, OUTSTANDING INVOICE.pdf.exe, 00000000.00000003.695725968.0000000006C2D000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            194.5.98.28
            brownhost22.ddns.netNetherlands
            208476DANILENKODEtrue

            Private

            IP
            192.168.2.1

            General Information

            Joe Sandbox Version:32.0.0 Black Diamond
            Analysis ID:433312
            Start date:11.06.2021
            Start time:16:09:16
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 14m 51s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:OUTSTANDING INVOICE.pdf.scr (renamed file extension from scr to exe)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:40
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@54/32@8/2
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 2.3% (good quality ratio 1.5%)
            • Quality average: 49.5%
            • Quality standard deviation: 38.3%
            HCA Information:
            • Successful, ratio: 93%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
            • TCP Packets have been reduced to 100
            • Excluded IPs from analysis (whitelisted): 52.255.188.83, 104.43.193.48, 142.250.180.196, 204.79.197.200, 13.107.21.200, 104.42.151.234, 20.50.102.62, 20.54.104.15, 20.54.26.129, 20.54.7.98, 93.184.221.240, 20.82.210.154, 92.122.213.247, 92.122.213.194
            • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, www.google.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, www.bing.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            16:10:20AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows update.lnk
            16:10:27API Interceptor1x Sleep call for process: OUTSTANDING INVOICE.pdf.exe modified
            16:10:35API Interceptor1x Sleep call for process: windows update.exe modified
            16:10:52API Interceptor648x Sleep call for process: InstallUtil.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            194.5.98.28Folha de dados de cota#U00e7#U00e3o para nossa empresa doc.exeGet hashmaliciousBrowse
              Folha de dados de cota#U00e7#U00e3o para nossa empresa doc.exeGet hashmaliciousBrowse
                27RFQ.exeGet hashmaliciousBrowse
                  32RFQ.exeGet hashmaliciousBrowse
                    3Agent Registration Update on PAGA.xlsx.exeGet hashmaliciousBrowse
                      20New Price list Update On DSTV&GOTV For Easter Bonus.xlsx.exeGet hashmaliciousBrowse
                        46Recently Updated On Our Pricing And Commissions On Paga.xlsx.exeGet hashmaliciousBrowse
                          9PAGA Commission Analysis On Bill Payment And Airtime for the month of march 2019.pdf.exeGet hashmaliciousBrowse
                            31ACTIVATION TEMPLATE.xlsx.exeGet hashmaliciousBrowse
                              3Paga Agent Bonus Activation For The Month Of March 2019.pdf.exeGet hashmaliciousBrowse
                                19Important Verification Information Update On QT Paypoint.xlsx.exeGet hashmaliciousBrowse
                                  35Agent price update as at 21st of March 2019.xlsx.exeGet hashmaliciousBrowse
                                    54AGENT GUIDE DOCUMENT.pdf.exeGet hashmaliciousBrowse
                                      3OFFER LETTER.pdf.exeGet hashmaliciousBrowse
                                        612019 DEALERS CONFERENCE REPORT ON DSTVGOTV AGENT.pdf.exeGet hashmaliciousBrowse
                                          18new pricing on Quickteller Paypoint & Multi Choice.xlsx.exeGet hashmaliciousBrowse
                                            37SWAP TEMPLATE-DEALERS.pdf.exeGet hashmaliciousBrowse
                                              1Quickteller Paypoint - Transaction Statement For January 2019.pdf.exeGet hashmaliciousBrowse

                                                Domains

                                                No context

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                DANILENKODERequest Letter for Courtesy Call.xlsxGet hashmaliciousBrowse
                                                • 194.5.97.61
                                                SecuriteInfo.com.Heur.23766.xlsGet hashmaliciousBrowse
                                                • 194.5.97.241
                                                SwiftCopy.pdf.exeGet hashmaliciousBrowse
                                                • 194.5.98.31
                                                wlCqbMRJ7p.exeGet hashmaliciousBrowse
                                                • 194.5.98.5
                                                SecuriteInfo.com.Trojan.PackedNET.832.3222.exeGet hashmaliciousBrowse
                                                • 194.5.98.144
                                                SecuriteInfo.com.Trojan.PackedNET.831.12541.exeGet hashmaliciousBrowse
                                                • 194.5.98.144
                                                0Cg1YYs1sv.exeGet hashmaliciousBrowse
                                                • 194.5.98.144
                                                Duplicated Orders.xlsxGet hashmaliciousBrowse
                                                • 194.5.98.144
                                                DEPOSITAR.xlsxGet hashmaliciousBrowse
                                                • 194.5.98.144
                                                InvoicePOzGlybgcIc1vHasG.exeGet hashmaliciousBrowse
                                                • 194.5.98.87
                                                POInvoiceOrderIuVvcl0VWEOAmXy.exeGet hashmaliciousBrowse
                                                • 194.5.98.87
                                                payment invoice.exeGet hashmaliciousBrowse
                                                • 194.5.98.23
                                                #RFQ ORDER484475577797.exeGet hashmaliciousBrowse
                                                • 194.5.98.120
                                                b6yzWugw8V.exeGet hashmaliciousBrowse
                                                • 194.5.98.107
                                                0041#Receipt.pif.exeGet hashmaliciousBrowse
                                                • 194.5.98.180
                                                j07ghiByDq.exeGet hashmaliciousBrowse
                                                • 194.5.97.146
                                                j07ghiByDq.exeGet hashmaliciousBrowse
                                                • 194.5.97.146
                                                PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                • 194.5.97.18
                                                SecuriteInfo.com.Trojan.PackedNET.820.24493.exeGet hashmaliciousBrowse
                                                • 194.5.97.61
                                                DHL_file.exeGet hashmaliciousBrowse
                                                • 194.5.98.145

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                C:\Users\user\AppData\Local\Temp\windows update.exeSecuriteInfo.com.Variant.Razy.840898.18291.exeGet hashmaliciousBrowse
                                                  68Aj4oxPok.exeGet hashmaliciousBrowse
                                                    Ysur2E8xPs.exeGet hashmaliciousBrowse
                                                      payment swift copy.exeGet hashmaliciousBrowse
                                                        I201002X430 CIF #20210604.exeGet hashmaliciousBrowse
                                                          PO_6620200947535257662_Arabico.PDF.exeGet hashmaliciousBrowse
                                                            s.exeGet hashmaliciousBrowse
                                                              PO_6620200947535257661_Arabico.PDF.exeGet hashmaliciousBrowse
                                                                MV.exeGet hashmaliciousBrowse
                                                                  e.exeGet hashmaliciousBrowse
                                                                    RFQ9088QTY.exeGet hashmaliciousBrowse
                                                                      SRESTKM-series.exeGet hashmaliciousBrowse
                                                                        All Details.exeGet hashmaliciousBrowse
                                                                          Property Samples 1.exeGet hashmaliciousBrowse
                                                                            malwa.exeGet hashmaliciousBrowse
                                                                              Sorted Properties.exeGet hashmaliciousBrowse
                                                                                SecuriteInfo.com.BehavesLike.Win32.Generic.jc.exeGet hashmaliciousBrowse
                                                                                  47432000083600.xlsxGet hashmaliciousBrowse
                                                                                    Mortgage Description.exeGet hashmaliciousBrowse
                                                                                      jf6RU7vI5Y.exeGet hashmaliciousBrowse
                                                                                        C:\Users\user\AppData\Local\Temp\InstallUtil.exeqe8V4QGYIK.exeGet hashmaliciousBrowse
                                                                                          POD0608.docGet hashmaliciousBrowse
                                                                                            SKM__C20192910887888001990.pdf.exeGet hashmaliciousBrowse
                                                                                              http___pbfoa.org_f.exeGet hashmaliciousBrowse
                                                                                                DHL_June 2021 at 7.M_9B7290_PDF.exeGet hashmaliciousBrowse
                                                                                                  SecuriteInfo.com.Trojan.GenericKD.46369990.8945.exeGet hashmaliciousBrowse
                                                                                                    SecuriteInfo.com.Variant.Bulz.480664.28948.exeGet hashmaliciousBrowse
                                                                                                      Halkbank_Ekstre_20210206_080203_744632.exeGet hashmaliciousBrowse
                                                                                                        Halkbank_Ekstre_20210602_080203_744632.exeGet hashmaliciousBrowse
                                                                                                          ONS-2_exe.exeGet hashmaliciousBrowse
                                                                                                            mvJMfkrri8.exeGet hashmaliciousBrowse
                                                                                                              1X6McyRQlO.exeGet hashmaliciousBrowse
                                                                                                                Halkbank_Ekstre_20210528_080203_744632.exeGet hashmaliciousBrowse
                                                                                                                  CYGK8igofD.exeGet hashmaliciousBrowse
                                                                                                                    Halkbank_Ekstre_20210526_080203_744632.exeGet hashmaliciousBrowse
                                                                                                                      SKBMT_0052Statement gpj.exeGet hashmaliciousBrowse
                                                                                                                        PO#903_2224_NGUYEN_LINH_SERVICE_AND_TRADINGS_COx.exeGet hashmaliciousBrowse
                                                                                                                          RFQ#1875-ET1-002.eXEGet hashmaliciousBrowse
                                                                                                                            V99tNu1MCy.exeGet hashmaliciousBrowse
                                                                                                                              Patch.exeGet hashmaliciousBrowse

                                                                                                                                Created / dropped Files

                                                                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OUTSTANDING INVOICE.pdf.exe.log
                                                                                                                                Process:C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe
                                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                                Category:modified
                                                                                                                                Size (bytes):1402
                                                                                                                                Entropy (8bit):5.338819835253785
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4K5AE4Kzr7K84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoesX3:MIHK5HKXE1qHbHK5AHKzvKviYHKhQnoe
                                                                                                                                MD5:F2152F0304453BCFB93E6D4F93C3F0DC
                                                                                                                                SHA1:DD69A4D7F9F9C8D97F1DF535BA3949E9325B5A2F
                                                                                                                                SHA-256:5A4D59CD30A1AF620B87602BC23A3F1EFEF792884053DAE6A89D1AC9AAD4A411
                                                                                                                                SHA-512:02402D9EAA2DF813F83A265C31D00048F84AD18AE23935B428062A9E09B173B13E93A3CACC6547277DA6F937BBC413B839620BA600144739DA37086E03DD8B4F
                                                                                                                                Malicious:true
                                                                                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Co
                                                                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\windows update.exe.log
                                                                                                                                Process:C:\Users\user\Documents\windows update.exe
                                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):1402
                                                                                                                                Entropy (8bit):5.338819835253785
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4K5AE4Kzr7K84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoesX3:MIHK5HKXE1qHbHK5AHKzvKviYHKhQnoe
                                                                                                                                MD5:F2152F0304453BCFB93E6D4F93C3F0DC
                                                                                                                                SHA1:DD69A4D7F9F9C8D97F1DF535BA3949E9325B5A2F
                                                                                                                                SHA-256:5A4D59CD30A1AF620B87602BC23A3F1EFEF792884053DAE6A89D1AC9AAD4A411
                                                                                                                                SHA-512:02402D9EAA2DF813F83A265C31D00048F84AD18AE23935B428062A9E09B173B13E93A3CACC6547277DA6F937BBC413B839620BA600144739DA37086E03DD8B4F
                                                                                                                                Malicious:false
                                                                                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Co
                                                                                                                                C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                                                                Process:C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe
                                                                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):41064
                                                                                                                                Entropy (8bit):6.164873449128079
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                                                                                                MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                                                                                                SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                                                                                                SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                                                                                                SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                                                                                                Malicious:true
                                                                                                                                Antivirus:
                                                                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                Joe Sandbox View:
                                                                                                                                • Filename: qe8V4QGYIK.exe, Detection: malicious, Browse
                                                                                                                                • Filename: POD0608.doc, Detection: malicious, Browse
                                                                                                                                • Filename: SKM__C20192910887888001990.pdf.exe, Detection: malicious, Browse
                                                                                                                                • Filename: http___pbfoa.org_f.exe, Detection: malicious, Browse
                                                                                                                                • Filename: DHL_June 2021 at 7.M_9B7290_PDF.exe, Detection: malicious, Browse
                                                                                                                                • Filename: SecuriteInfo.com.Trojan.GenericKD.46369990.8945.exe, Detection: malicious, Browse
                                                                                                                                • Filename: SecuriteInfo.com.Variant.Bulz.480664.28948.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Halkbank_Ekstre_20210206_080203_744632.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Halkbank_Ekstre_20210602_080203_744632.exe, Detection: malicious, Browse
                                                                                                                                • Filename: ONS-2_exe.exe, Detection: malicious, Browse
                                                                                                                                • Filename: mvJMfkrri8.exe, Detection: malicious, Browse
                                                                                                                                • Filename: 1X6McyRQlO.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Halkbank_Ekstre_20210528_080203_744632.exe, Detection: malicious, Browse
                                                                                                                                • Filename: CYGK8igofD.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Halkbank_Ekstre_20210526_080203_744632.exe, Detection: malicious, Browse
                                                                                                                                • Filename: SKBMT_0052Statement gpj.exe, Detection: malicious, Browse
                                                                                                                                • Filename: PO#903_2224_NGUYEN_LINH_SERVICE_AND_TRADINGS_COx.exe, Detection: malicious, Browse
                                                                                                                                • Filename: RFQ#1875-ET1-002.eXE, Detection: malicious, Browse
                                                                                                                                • Filename: V99tNu1MCy.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Patch.exe, Detection: malicious, Browse
                                                                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                                                                                                C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Process:C:\Users\user\Documents\windows update.exe
                                                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):78336
                                                                                                                                Entropy (8bit):4.369296705546591
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:768:jlU4+MS3Fu0thSOV4GM0SuHk9Oh/1TRIWUk7NlfaNV9KQLxXXSv:l6o03IGMLuHk+Ck5lfaNP7xSv
                                                                                                                                MD5:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                SHA1:590D860B909804349E0CDC2F1662B37BD62F7463
                                                                                                                                SHA-256:2D0DC6216F613AC7551A7E70A798C22AEE8EB9819428B1357E2B8C73BEF905AD
                                                                                                                                SHA-512:518991B68496B3F8545E418CF9B345E0791E09CC20D177B8AA47E0ABA447AA55383C64F5BDACA39F2B061A5D08C16F2AD484AF8A9F238CA23AB081618FBA3AD3
                                                                                                                                Malicious:true
                                                                                                                                Antivirus:
                                                                                                                                • Antivirus: Metadefender, Detection: 14%, Browse
                                                                                                                                • Antivirus: ReversingLabs, Detection: 13%
                                                                                                                                Joe Sandbox View:
                                                                                                                                • Filename: SecuriteInfo.com.Variant.Razy.840898.18291.exe, Detection: malicious, Browse
                                                                                                                                • Filename: 68Aj4oxPok.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Ysur2E8xPs.exe, Detection: malicious, Browse
                                                                                                                                • Filename: payment swift copy.exe, Detection: malicious, Browse
                                                                                                                                • Filename: I201002X430 CIF #20210604.exe, Detection: malicious, Browse
                                                                                                                                • Filename: PO_6620200947535257662_Arabico.PDF.exe, Detection: malicious, Browse
                                                                                                                                • Filename: s.exe, Detection: malicious, Browse
                                                                                                                                • Filename: PO_6620200947535257661_Arabico.PDF.exe, Detection: malicious, Browse
                                                                                                                                • Filename: MV.exe, Detection: malicious, Browse
                                                                                                                                • Filename: e.exe, Detection: malicious, Browse
                                                                                                                                • Filename: RFQ9088QTY.exe, Detection: malicious, Browse
                                                                                                                                • Filename: SRESTKM-series.exe, Detection: malicious, Browse
                                                                                                                                • Filename: All Details.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Property Samples 1.exe, Detection: malicious, Browse
                                                                                                                                • Filename: malwa.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Sorted Properties.exe, Detection: malicious, Browse
                                                                                                                                • Filename: SecuriteInfo.com.BehavesLike.Win32.Generic.jc.exe, Detection: malicious, Browse
                                                                                                                                • Filename: 47432000083600.xlsx, Detection: malicious, Browse
                                                                                                                                • Filename: Mortgage Description.exe, Detection: malicious, Browse
                                                                                                                                • Filename: jf6RU7vI5Y.exe, Detection: malicious, Browse
                                                                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Y ................P..&...........D... ........@.. ....................................`..................................D..W....`..............................hD............................................... ............... ..H............text....$... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............0..............@..B.................D......H.......l....%......)....................................................0..6.......(8...t....&.(8...t....&......(8...t...................8;....8%.....(8...t....&.(8...t............:.....(8...t....:.....(8...t....:....(8...t....................................\:@....(8...t....&.)...&8.....(8...t....&(8...t....&.....:.......8x........:L...88....(8...t....&(8...t....&(8...t....&(8...t.....................:....8!.....(8...t....&......(8...t....&.....(8...t....:8.....(8...t....&.
                                                                                                                                C:\Users\user\AppData\Local\Temp\windows update.txt
                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):57
                                                                                                                                Entropy (8bit):4.67255728631531
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:3:1RPt+coAl+rpdgyn:jwNADyn
                                                                                                                                MD5:B123C14157021A4A8CBB20A6A79CADF2
                                                                                                                                SHA1:453A4D2A9D0EE7B92410B61D0EE2B9E376673F66
                                                                                                                                SHA-256:135B683A083C792F3BBE477AD0B4387FF52E525AF7B5E9BDEE2DBAEE90415521
                                                                                                                                SHA-512:12908F27A937DCA23C6CEB299A57916F5DAFD9BC69ABB195E1CC140BDAE677F6817D40DB90AF56CF56463BD34ED96537127B2050784228A09F73E753CB0E3A25
                                                                                                                                Malicious:false
                                                                                                                                Preview: 4552..C:\Users\user\Documents\windows update.exe..7076..
                                                                                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                                                                Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):8
                                                                                                                                Entropy (8bit):3.0
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:3:OH+n:Oen
                                                                                                                                MD5:8E40229D25FAFCE8413383CD73D05F6D
                                                                                                                                SHA1:C0B22276D7342D7FFF71039D3F154DEF7CD6C879
                                                                                                                                SHA-256:F64C0C11CFD8BF8725860EF9CD54F540A2D1FB3FD807DDAF163DD3C94EB5E529
                                                                                                                                SHA-512:DFCFA538CB853142C93834A1DB4F5A114F5418296CCE950CD85EDF1487218EAAD9A79717DEF3030887AA5F53DBB67BD9E04E30798312C027C179917CE647F454
                                                                                                                                Malicious:true
                                                                                                                                Preview: _....,.H
                                                                                                                                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows update.lnk
                                                                                                                                Process:C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe
                                                                                                                                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):886
                                                                                                                                Entropy (8bit):3.231105392562601
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:12:8wl0y0sXowAOcuJEIx+0OS503oR9S50XgRN1A4t2Y+xIBjK:8KLgr0Oi0Yri0Xg+7aB
                                                                                                                                MD5:7837A5262A520E094F689075739AA11A
                                                                                                                                SHA1:C18E43A81700E883BADA63011A13C4FCE1EE76E4
                                                                                                                                SHA-256:FAB5A94E97A4424EF7881F1248EC45B8E08196138B01658C2707631D04FEC7C6
                                                                                                                                SHA-512:0110EE04C937CE5DF98DBFBBBE33F71DB30277D5C7F73FDB997C9C2639B15E218C60BF93C8C95CC98697369C1F79805A8BE453836611B6FE0CCF9DB853C7CF74
                                                                                                                                Malicious:false
                                                                                                                                Preview: L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....\.1...........Documents.D............................................D.o.c.u.m.e.n.t.s.....x.2...........windows update.exe..V............................................w.i.n.d.o.w.s. .u.p.d.a.t.e...e.x.e..."...1.....\.....\.....\.....\.....\.....\.....\.D.o.c.u.m.e.n.t.s.\.w.i.n.d.o.w.s. .u.p.d.a.t.e...e.x.e.+.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.D.o.c.u.m.e.n.t.s.\.w.i.n.d.o.w.s. .u.p.d.a.t.e...e.x.e.............)...............#.F..l.H.i.)...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
                                                                                                                                C:\Users\user\Documents\windows update.exe
                                                                                                                                Process:C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe
                                                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):759808
                                                                                                                                Entropy (8bit):6.605601315429397
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:12288:RjMA4cScHfc4eucIV7B+Aci98+WrWwYPF+h3HjsrGAUyE:RjEkfDxcc7Bud6fPFUz4GlB
                                                                                                                                MD5:416CCD703AFF8844F0454E112F663C06
                                                                                                                                SHA1:1DB05B7BEDA1A9E4FB0C4CD8E04C512C98EFDF3C
                                                                                                                                SHA-256:E1B2CA52707D724682E2C2618EB33899B019E8650E325E800E43E2042231F55D
                                                                                                                                SHA-512:D44EC955BE8247D6F6CD4C5AC7DC714142560A5378AF0DA9A3C0A1E0D871A5D12137226657E55B10FE4296CD5BB0EBB64DE8852678CCFBB868FF1C591B6631A2
                                                                                                                                Malicious:true
                                                                                                                                Antivirus:
                                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                • Antivirus: ReversingLabs, Detection: 52%
                                                                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!..Y.................f...0......>.... ........@.. ....................................`....................................S........,........................................................................... ............... ..H............text...Dd... ...f.................. ..`.rsrc....,...........h..............@..@.reloc..............................@..B................ .......H..................O.......R...........................................:...%.k...hs.mx!.cQu5..l{K....ynPn..oO.. c...0r.cg.J...O..dX......4..9*..]....K....gK.]..o\!.<...s.)<....js9!...K.}...|lqr(......Pd.d(l.\...........4.%.4.1......H..g.......C..v...h.t.i..........3.l..........,.k...........,.q........~...N.3............z..D........A.....g...E.7........a...B.*.../....;.;.;l..+.>.3.)."]7+.q.)+B.L.D......0.....p........5...!.,.).
                                                                                                                                C:\Users\user\Documents\windows update.exe:Zone.Identifier
                                                                                                                                Process:C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe
                                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):26
                                                                                                                                Entropy (8bit):3.95006375643621
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                Malicious:true
                                                                                                                                Preview: [ZoneTransfer]....ZoneId=0

                                                                                                                                Static File Info

                                                                                                                                General

                                                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                Entropy (8bit):6.605601315429397
                                                                                                                                TrID:
                                                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                                                                File name:OUTSTANDING INVOICE.pdf.exe
                                                                                                                                File size:759808
                                                                                                                                MD5:416ccd703aff8844f0454e112f663c06
                                                                                                                                SHA1:1db05b7beda1a9e4fb0c4cd8e04c512c98efdf3c
                                                                                                                                SHA256:e1b2ca52707d724682e2c2618eb33899b019e8650e325e800e43e2042231f55d
                                                                                                                                SHA512:d44ec955be8247d6f6cd4c5ac7dc714142560a5378af0da9a3c0a1e0d871a5d12137226657e55b10fe4296cd5bb0ebb64de8852678ccfbb868ff1c591b6631a2
                                                                                                                                SSDEEP:12288:RjMA4cScHfc4eucIV7B+Aci98+WrWwYPF+h3HjsrGAUyE:RjEkfDxcc7Bud6fPFUz4GlB
                                                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!..Y.................f...0......>.... ........@.. ....................................`................................

                                                                                                                                File Icon

                                                                                                                                Icon Hash:4e9292f2c88cd3cc

                                                                                                                                Static PE Info

                                                                                                                                General

                                                                                                                                Entrypoint:0x4b843e
                                                                                                                                Entrypoint Section:.text
                                                                                                                                Digitally signed:false
                                                                                                                                Imagebase:0x400000
                                                                                                                                Subsystem:windows gui
                                                                                                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                                                                                                Time Stamp:0x5910BC21 [Mon May 8 18:42:41 2017 UTC]
                                                                                                                                TLS Callbacks:
                                                                                                                                CLR (.Net) Version:v4.0.30319
                                                                                                                                OS Version Major:4
                                                                                                                                OS Version Minor:0
                                                                                                                                File Version Major:4
                                                                                                                                File Version Minor:0
                                                                                                                                Subsystem Version Major:4
                                                                                                                                Subsystem Version Minor:0
                                                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                                                Entrypoint Preview

                                                                                                                                Instruction
                                                                                                                                jmp dword ptr [00402000h]
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al
                                                                                                                                add byte ptr [eax], al

                                                                                                                                Data Directories

                                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb83e80x53.text
                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xba0000x2c2e.rsrc
                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xbe0000xc.reloc
                                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                                                Sections

                                                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                .text0x20000xb64440xb6600False0.63441221513data6.6286481102IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                                .rsrc0xba0000x2c2e0x2e00False0.143597146739data3.22794117168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                .reloc0xbe0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                                                Resources

                                                                                                                                NameRVASizeTypeLanguageCountry
                                                                                                                                RT_ICON0xba1300x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 134217728, next used block 117440512
                                                                                                                                RT_GROUP_ICON0xbc6d80x14data
                                                                                                                                RT_VERSION0xbc6ec0x358dataEnglishUnited States
                                                                                                                                RT_MANIFEST0xbca440x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                                                                Imports

                                                                                                                                DLLImport
                                                                                                                                mscoree.dll_CorExeMain

                                                                                                                                Version Infos

                                                                                                                                DescriptionData
                                                                                                                                LegalCopyrightCopyright 2019 Adobe Inc. All rights reserved.
                                                                                                                                InternalNameAdobe Download Manager
                                                                                                                                FileVersion2.0.0.571s
                                                                                                                                CompanyNameAdobe Inc
                                                                                                                                ProductNameAdobe Download Manager
                                                                                                                                ProductVersion2.0.0.571s
                                                                                                                                FileDescriptionAdobe Download Manager
                                                                                                                                OriginalFilenameAdobe Download Manager
                                                                                                                                Translation0x0409 0x04b0

                                                                                                                                Possible Origin

                                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                                EnglishUnited States

                                                                                                                                Network Behavior

                                                                                                                                Network Port Distribution

                                                                                                                                TCP Packets

                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                Jun 11, 2021 16:10:53.754796028 CEST497652021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:10:53.836800098 CEST202149765194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:54.341458082 CEST497652021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:10:54.425761938 CEST202149765194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:54.934674978 CEST497652021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:10:55.016798973 CEST202149765194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:59.796838045 CEST497662021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:10:59.869024038 CEST202149766194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:00.372678041 CEST497662021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:00.445560932 CEST202149766194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:00.950908899 CEST497662021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:01.021079063 CEST202149766194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:05.030323982 CEST497702021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:05.099931002 CEST202149770194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:05.676389933 CEST497702021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:05.745245934 CEST202149770194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:06.248193026 CEST497702021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:06.316991091 CEST202149770194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:10.486358881 CEST497762021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:10.568718910 CEST202149776194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:11.076807022 CEST497762021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:11.158328056 CEST202149776194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:11.670519114 CEST497762021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:11.751717091 CEST202149776194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:15.869035006 CEST497772021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:15.939229965 CEST202149777194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:16.577153921 CEST497772021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:16.647345066 CEST202149777194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:17.186604977 CEST497772021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:17.260622025 CEST202149777194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:21.400218010 CEST497782021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:21.470674038 CEST202149778194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:21.984031916 CEST497782021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:22.054353952 CEST202149778194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:22.562143087 CEST497782021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:22.632569075 CEST202149778194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:26.642127037 CEST497792021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:26.712371111 CEST202149779194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:27.218791962 CEST497792021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:27.290316105 CEST202149779194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:27.796947956 CEST497792021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:27.867325068 CEST202149779194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:31.885158062 CEST497802021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:31.955542088 CEST202149780194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:32.469330072 CEST497802021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:32.538438082 CEST202149780194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:33.047408104 CEST497802021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:33.116451979 CEST202149780194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:37.152029991 CEST497812021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:37.234179020 CEST202149781194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:37.735336065 CEST497812021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:37.817608118 CEST202149781194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:38.329113960 CEST497812021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:38.411386013 CEST202149781194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:42.529104948 CEST497842021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:42.611358881 CEST202149784194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:43.126522064 CEST497842021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:43.208637953 CEST202149784194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:43.720299006 CEST497842021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:43.802436113 CEST202149784194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:47.931014061 CEST497852021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:48.001038074 CEST202149785194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:48.501982927 CEST497852021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:48.572016001 CEST202149785194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:49.080070972 CEST497852021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:49.150254965 CEST202149785194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:53.257795095 CEST497862021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:53.327630997 CEST202149786194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:53.830683947 CEST497862021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:53.900885105 CEST202149786194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:54.409288883 CEST497862021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:54.479850054 CEST202149786194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:58.500333071 CEST497872021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:58.571573973 CEST202149787194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:59.080910921 CEST497872021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:59.152781963 CEST202149787194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:59.659204960 CEST497872021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:11:59.729101896 CEST202149787194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:03.807720900 CEST497882021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:03.877974033 CEST202149788194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:04.378314018 CEST497882021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:04.448364973 CEST202149788194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:04.956682920 CEST497882021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:05.026798010 CEST202149788194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:09.061036110 CEST497892021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:09.143297911 CEST202149789194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:09.644335032 CEST497892021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:09.726583004 CEST202149789194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:10.238164902 CEST497892021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:10.320278883 CEST202149789194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:14.392952919 CEST497902021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:14.463073015 CEST202149790194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:14.972944021 CEST497902021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:15.043168068 CEST202149790194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:15.551209927 CEST497902021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:15.621345997 CEST202149790194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:19.694289923 CEST497912021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:19.764209986 CEST202149791194.5.98.28192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:20.270231962 CEST497912021192.168.2.4194.5.98.28
                                                                                                                                Jun 11, 2021 16:12:20.340442896 CEST202149791194.5.98.28192.168.2.4

                                                                                                                                UDP Packets

                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                Jun 11, 2021 16:09:58.052295923 CEST4971453192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:09:58.102273941 CEST53497148.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:09:58.885314941 CEST5802853192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:09:58.935328007 CEST53580288.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:00.609774113 CEST5309753192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:00.660813093 CEST53530978.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:01.672369003 CEST4925753192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:01.725960970 CEST53492578.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:05.309894085 CEST6238953192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:05.360323906 CEST53623898.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:05.400324106 CEST4991053192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:05.453732967 CEST53499108.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:05.931317091 CEST5585453192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:06.006508112 CEST53558548.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:06.013659954 CEST6454953192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:06.064069033 CEST53645498.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:06.126873970 CEST6315353192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:06.177362919 CEST53631538.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:07.038701057 CEST5299153192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:07.088593960 CEST53529918.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:07.971386909 CEST5370053192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:08.021545887 CEST53537008.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:08.874582052 CEST5172653192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:08.924781084 CEST53517268.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:09.782563925 CEST5679453192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:09.835807085 CEST53567948.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:10.776289940 CEST5653453192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:10.827405930 CEST53565348.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:11.906209946 CEST5662753192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:11.956464052 CEST53566278.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:12.825419903 CEST5662153192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:12.875835896 CEST53566218.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:14.062639952 CEST6311653192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:14.112632990 CEST53631168.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:15.201936007 CEST6407853192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:15.260807037 CEST53640788.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:17.201134920 CEST6480153192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:17.251207113 CEST53648018.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:18.358104944 CEST6172153192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:18.411107063 CEST53617218.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:20.134321928 CEST5125553192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:20.184458017 CEST53512558.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:22.790849924 CEST6152253192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:22.845566034 CEST53615228.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:26.803889036 CEST5233753192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:26.869482040 CEST53523378.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:29.614207983 CEST5504653192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:29.667366028 CEST53550468.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:30.167160988 CEST4961253192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:30.230053902 CEST53496128.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:30.252671957 CEST4928553192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:30.314182043 CEST53492858.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:31.563957930 CEST5060153192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:31.617048025 CEST53506018.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:32.161106110 CEST6087553192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:32.214454889 CEST53608758.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:32.226557016 CEST5644853192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:32.279926062 CEST53564488.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:44.360754967 CEST5917253192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:44.584383965 CEST53591728.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:45.128715992 CEST6242053192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:45.190593004 CEST53624208.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:45.253397942 CEST6057953192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:45.321670055 CEST53605798.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:45.791173935 CEST5018353192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:45.849689007 CEST53501838.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:46.637818098 CEST6153153192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:46.698857069 CEST53615318.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:47.258935928 CEST4922853192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:47.318607092 CEST53492288.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:47.926197052 CEST5979453192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:47.986593962 CEST53597948.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:48.729185104 CEST5591653192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:48.789629936 CEST53559168.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:49.824024916 CEST5275253192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:49.883054018 CEST53527528.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:50.749638081 CEST6054253192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:50.902546883 CEST53605428.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:51.451286077 CEST6068953192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:51.501610041 CEST53606898.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:10:53.238806009 CEST6420653192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:10:53.298938036 CEST53642068.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:01.247103930 CEST5090453192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:01.286156893 CEST5752553192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:01.314148903 CEST53509048.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:01.347862005 CEST53575258.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:05.610733986 CEST5381453192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:05.670967102 CEST53538148.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:10.420857906 CEST5341853192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:10.484180927 CEST53534188.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:15.808563948 CEST6283353192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:15.867630959 CEST53628338.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:21.331908941 CEST5926053192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:21.392391920 CEST53592608.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:38.724381924 CEST4994453192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:38.794017076 CEST53499448.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:40.939394951 CEST6330053192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:41.008785963 CEST53633008.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:42.466228008 CEST6144953192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:42.527839899 CEST53614498.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:47.852722883 CEST5127553192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:47.914501905 CEST53512758.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:11:53.194025993 CEST6349253192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:11:53.255685091 CEST53634928.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:14.333482027 CEST5894553192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:12:14.391980886 CEST53589458.8.8.8192.168.2.4
                                                                                                                                Jun 11, 2021 16:12:19.632985115 CEST6077953192.168.2.48.8.8.8
                                                                                                                                Jun 11, 2021 16:12:19.693648100 CEST53607798.8.8.8192.168.2.4

                                                                                                                                DNS Queries

                                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                                Jun 11, 2021 16:11:10.420857906 CEST192.168.2.48.8.8.80xd7afStandard query (0)brownhost22.ddns.netA (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:15.808563948 CEST192.168.2.48.8.8.80x2041Standard query (0)brownhost22.ddns.netA (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:21.331908941 CEST192.168.2.48.8.8.80x5a09Standard query (0)brownhost22.ddns.netA (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:42.466228008 CEST192.168.2.48.8.8.80x5c75Standard query (0)brownhost22.ddns.netA (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:47.852722883 CEST192.168.2.48.8.8.80x1911Standard query (0)brownhost22.ddns.netA (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:53.194025993 CEST192.168.2.48.8.8.80x4fcStandard query (0)brownhost22.ddns.netA (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:12:14.333482027 CEST192.168.2.48.8.8.80xec22Standard query (0)brownhost22.ddns.netA (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:12:19.632985115 CEST192.168.2.48.8.8.80x4224Standard query (0)brownhost22.ddns.netA (IP address)IN (0x0001)

                                                                                                                                DNS Answers

                                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                                Jun 11, 2021 16:11:10.484180927 CEST8.8.8.8192.168.2.40xd7afNo error (0)brownhost22.ddns.net194.5.98.28A (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:15.867630959 CEST8.8.8.8192.168.2.40x2041No error (0)brownhost22.ddns.net194.5.98.28A (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:21.392391920 CEST8.8.8.8192.168.2.40x5a09No error (0)brownhost22.ddns.net194.5.98.28A (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:42.527839899 CEST8.8.8.8192.168.2.40x5c75No error (0)brownhost22.ddns.net194.5.98.28A (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:47.914501905 CEST8.8.8.8192.168.2.40x1911No error (0)brownhost22.ddns.net194.5.98.28A (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:11:53.255685091 CEST8.8.8.8192.168.2.40x4fcNo error (0)brownhost22.ddns.net194.5.98.28A (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:12:14.391980886 CEST8.8.8.8192.168.2.40xec22No error (0)brownhost22.ddns.net194.5.98.28A (IP address)IN (0x0001)
                                                                                                                                Jun 11, 2021 16:12:19.693648100 CEST8.8.8.8192.168.2.40x4224No error (0)brownhost22.ddns.net194.5.98.28A (IP address)IN (0x0001)

                                                                                                                                Code Manipulations

                                                                                                                                Statistics

                                                                                                                                Behavior

                                                                                                                                Click to jump to process

                                                                                                                                System Behavior

                                                                                                                                General

                                                                                                                                Start time:16:10:03
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\Desktop\OUTSTANDING INVOICE.pdf.exe'
                                                                                                                                Imagebase:0x4e0000
                                                                                                                                File size:759808 bytes
                                                                                                                                MD5 hash:416CCD703AFF8844F0454E112F663C06
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Yara matches:
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.698113969.0000000003AAA000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.697836109.000000000394C000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                Reputation:low

                                                                                                                                General

                                                                                                                                Start time:16:10:26
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\Documents\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\Documents\windows update.exe'
                                                                                                                                Imagebase:0x740000
                                                                                                                                File size:759808 bytes
                                                                                                                                MD5 hash:416CCD703AFF8844F0454E112F663C06
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Antivirus matches:
                                                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                                                • Detection: 52%, ReversingLabs
                                                                                                                                Reputation:low

                                                                                                                                General

                                                                                                                                Start time:16:10:28
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\Documents\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\Documents\windows update.exe'
                                                                                                                                Imagebase:0xc0000
                                                                                                                                File size:759808 bytes
                                                                                                                                MD5 hash:416CCD703AFF8844F0454E112F663C06
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Yara matches:
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.931537578.00000000037A9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.931420211.000000000364C000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.931144467.0000000003528000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                Reputation:low

                                                                                                                                General

                                                                                                                                Start time:16:10:46
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                                                                                Imagebase:0x310000
                                                                                                                                File size:41064 bytes
                                                                                                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Yara matches:
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000000.738643631.0000000000702000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000000.738992009.0000000000702000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.925828807.0000000003659000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.914832988.0000000000702000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.929762962.0000000004FE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.929762962.0000000004FE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.930250382.00000000058B0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                Antivirus matches:
                                                                                                                                • Detection: 0%, Metadefender, Browse
                                                                                                                                • Detection: 0%, ReversingLabs
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:10:53
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x820000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Antivirus matches:
                                                                                                                                • Detection: 14%, Metadefender, Browse
                                                                                                                                • Detection: 13%, ReversingLabs
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:10:56
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x160000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:00
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xa40000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:01
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xad0000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:06
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xf90000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:07
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x920000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:11
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xd50000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:14
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x450000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:18
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xc10000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:20
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x640000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:23
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x340000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                                                Reputation:moderate

                                                                                                                                General

                                                                                                                                Start time:16:11:25
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xf50000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:29
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xaa0000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:32
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x950000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:36
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x20000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:38
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x240000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:41
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x2d0000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:43
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xe90000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:47
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xaa0000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:50
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x560000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:54
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xc30000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:11:56
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0xb30000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                General

                                                                                                                                Start time:16:12:00
                                                                                                                                Start date:11/06/2021
                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\windows update.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:'C:\Users\user\AppData\Local\Temp\windows update.exe'
                                                                                                                                Imagebase:0x4d0000
                                                                                                                                File size:78336 bytes
                                                                                                                                MD5 hash:0E362E7005823D0BEC3719B902ED6D62
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:.Net C# or VB.NET

                                                                                                                                Disassembly

                                                                                                                                Code Analysis

                                                                                                                                Reset < >