Loading ...

Play interactive tourEdit tour

Windows Analysis Report Payment confirmation .exe

Overview

General Information

Sample Name:Payment confirmation .exe
Analysis ID:551433
MD5:aa035026516778019f8b8bd0e224fc03
SHA1:efae7e259b4581830c7e6bfeb94ed6dd25a54229
SHA256:39c5635ea42d63fe84500b9760fbe56e0fd3243007700749609bca1cd8d9e5d4
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Yara detected Nanocore RAT
Initial sample is a PE file and has a suspicious name
Connects to many ports of the same IP (likely port scanning)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Powershell Defender Exclusion
.NET source code contains method to dynamically call methods (often used by packers)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • Payment confirmation .exe (PID: 6996 cmdline: "C:\Users\user\Desktop\Payment confirmation .exe" MD5: AA035026516778019F8B8BD0E224FC03)
    • powershell.exe (PID: 3604 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 3600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 3116 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Payment confirmation .exe (PID: 5432 cmdline: C:\Users\user\Desktop\Payment confirmation .exe MD5: AA035026516778019F8B8BD0E224FC03)
    • Payment confirmation .exe (PID: 5520 cmdline: C:\Users\user\Desktop\Payment confirmation .exe MD5: AA035026516778019F8B8BD0E224FC03)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "2616a878-9933-42e4-9fe0-3b57e29b", "Domain1": "naki.airdns.org", "Domain2": "37.120.210.211", "Port": 56281, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "faff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    Click to see the 32 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    0.2.Payment confirmation .exe.363c208.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x5a9ad:$x1: NanoCore.ClientPluginHost
    • 0xa4fcd:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x5a9ea:$x2: IClientNetworkHost
    • 0xa500a:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x5e51d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0xa8b3d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0.2.Payment confirmation .exe.363c208.3.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0.2.Payment confirmation .exe.363c208.3.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0x5a715:$a: NanoCore
      • 0x5a725:$a: NanoCore
      • 0x5a959:$a: NanoCore
      • 0x5a96d:$a: NanoCore
      • 0x5a9ad:$a: NanoCore
      • 0xa4d35:$a: NanoCore
      • 0xa4d45:$a: NanoCore
      • 0xa4f79:$a: NanoCore
      • 0xa4f8d:$a: NanoCore
      • 0xa4fcd:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x5a774:$b: ClientPlugin
      • 0x5a976:$b: ClientPlugin
      • 0x5a9b6:$b: ClientPlugin
      10.2.Payment confirmation .exe.3a22a86.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0x145e3:$x1: NanoCore.ClientPluginHost
      • 0x3c845:$x1: NanoCore.ClientPluginHost
      • 0x556df:$x1: NanoCore.ClientPluginHost
      • 0x7d92d:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      • 0x14610:$x2: IClientNetworkHost
      • 0x3c85f:$x2: IClientNetworkHost
      • 0x5570c:$x2: IClientNetworkHost
      • 0x7d947:$x2: IClientNetworkHost
      10.2.Payment confirmation .exe.3a22a86.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x145e3:$x2: NanoCore.ClientPluginHost
      • 0x3c845:$x2: NanoCore.ClientPluginHost
      • 0x556df:$x2: NanoCore.ClientPluginHost
      • 0x7d92d:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0x156be:$s4: PipeCreated
      • 0x3fb82:$s4: PipeCreated
      • 0x567ba:$s4: PipeCreated
      • 0x80c6a:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      • 0x145fd:$s5: IClientLoggingHost
      • 0x3c832:$s5: IClientLoggingHost
      • 0x556f9:$s5: IClientLoggingHost
      • 0x7d91a:$s5: IClientLoggingHost
      Click to see the 69 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Payment confirmation .exe, ProcessId: 5520, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Payment confirmation .exe, ProcessId: 5520, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      System Summary:

      barindex
      Sigma detected: Suspicius Add Task From User AppData TempShow sources
      Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment confirmation .exe" , ParentImage: C:\Users\user\Desktop\Payment confirmation .exe, ParentProcessId: 6996, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp, ProcessId: 3116
      Sigma detected: Powershell Defender ExclusionShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment confirmation .exe" , ParentImage: C:\Users\user\Desktop\Payment confirmation .exe, ParentProcessId: 6996, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, ProcessId: 3604
      Sigma detected: Non Interactive PowerShellShow sources
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment confirmation .exe" , ParentImage: C:\Users\user\Desktop\Payment confirmation .exe, ParentProcessId: 6996, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, ProcessId: 3604
      Sigma detected: T1086 PowerShell ExecutionShow sources
      Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132864459695901373.3604.DefaultAppDomain.powershell

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Payment confirmation .exe, ProcessId: 5520, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Payment confirmation .exe, ProcessId: 5520, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "2616a878-9933-42e4-9fe0-3b57e29b", "Domain1": "naki.airdns.org", "Domain2": "37.120.210.211", "Port": 56281, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "faff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Antivirus detection for URL or domainShow sources
      Source: 37.120.210.211Avira URL Cloud: Label: malware
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTR
      Machine Learning detection for sampleShow sources
      Source: Payment confirmation .exeJoe Sandbox ML: detected
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\QNRauI.exeJoe Sandbox ML: detected
      Source: 10.2.Payment confirmation .exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.2.Payment confirmation .exe.52e0000.7.unpackAvira: Label: TR/NanoCore.fadte
      Source: 10.0.Payment confirmation .exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.Payment confirmation .exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.Payment confirmation .exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.Payment confirmation .exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.Payment confirmation .exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: Payment confirmation .exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: Payment confirmation .exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Networking:

      barindex
      Connects to many ports of the same IP (likely port scanning)Show sources
      Source: global trafficTCP traffic: 146.70.76.43 ports 56281,1,2,5,6,8
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: 37.120.210.211
      Source: Malware configuration extractorURLs: naki.airdns.org
      Source: Joe Sandbox ViewASN Name: TENET-1ZA TENET-1ZA
      Source: global trafficTCP traffic: 192.168.2.4:49761 -> 146.70.76.43:56281
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677385911.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677536867.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677732929.0000000005409000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
      Source: Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comM
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: Payment confirmation .exe, 00000000.00000003.677558315.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677216510.0000000005403000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677385911.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677536867.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677732929.0000000005409000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comwit
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: Payment confirmation .exe, 00000000.00000003.684072387.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: Payment confirmation .exe, 00000000.00000003.679784035.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.679682374.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: Payment confirmation .exe, 00000000.00000003.683286235.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683406802.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683351862.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: Payment confirmation .exe, 00000000.00000003.683286235.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683351862.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmld
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: Payment confirmation .exe, 00000000.00000003.680816196.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersIUy
      Source: Payment confirmation .exe, 00000000.00000003.679938204.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.694073095.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.679784035.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersTUF
      Source: Payment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersico
      Source: Payment confirmation .exe, 00000000.00000003.694073095.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersnox
      Source: Payment confirmation .exe, 00000000.00000003.683542352.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers~
      Source: Payment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers~Ul
      Source: Payment confirmation .exe, 00000000.00000002.729385777.0000000000A74000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.commfet
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.676069541.000000000542F000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: Payment confirmation .exe, 00000000.00000003.687634241.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: Payment confirmation .exe, 00000000.00000003.687703540.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687634241.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/~Rm
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)
      Source: Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/;
      Source: Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/C
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/L
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/O
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/)
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/;
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/C
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/p
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/pt-b
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
      Source: Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/y
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/z
      Source: Payment confirmation .exe, 00000000.00000003.680816196.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.
      Source: Payment confirmation .exe, 00000000.00000003.687529964.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687463634.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687617708.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687425665.000000000544C000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.p
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677972229.000000000542C000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: Payment confirmation .exe, 00000000.00000003.677944436.000000000542C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677972229.000000000542C000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com.
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.como
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: unknownDNS traffic detected: queries for: naki.airdns.org
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTR

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.52d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.62b4c9f.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.62b0000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.29e4fc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.62b0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.62be8a4.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: Payment confirmation .exe
      Source: Payment confirmation .exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.52d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.52d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.62b4c9f.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.62b4c9f.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.62b0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.62b0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.29e4fc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.29e4fc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.62b0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.62b0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.62be8a4.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.62be8a4.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_000825940_2_00082594
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2C1640_2_00A2C164
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2E5A00_2_00A2E5A0
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2E5B00_2_00A2E5B0
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2FBE00_2_00A2FBE0
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_07360EB60_2_07360EB6
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_073600260_2_07360026
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_073600400_2_07360040
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 9_2_000C25949_2_000C2594
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_006A259410_2_006A2594
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_0108E47110_2_0108E471
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_0108E48010_2_0108E480
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_0108BBD410_2_0108BBD4
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_04F8F5F810_2_04F8F5F8
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_04F8978810_2_04F89788
      Source: Payment confirmation .exeBinary or memory string: OriginalFilename vs Payment confirmation .exe
      Source: Payment confirmation .exe, 00000000.00000003.697326569.000000000349E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs Payment confirmation .exe
      Source: Payment confirmation .exe, 00000000.00000002.734838256.00000000071E0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs Payment confirmation .exe
      Source: Payment confirmation .exeBinary or memory string: OriginalFilename vs Payment confirmation .exe
      Source: Payment confirmation .exeBinary or memory string: OriginalFilename vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exeBinary or memory string: OriginalFilenameOnDeserializingAttribu.exe2 vs Payment confirmation .exe
      Source: Payment confirmation .exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: QNRauI.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile read: C:\Users\user\Desktop\Payment confirmation .exeJump to behavior
      Source: Payment confirmation .exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Payment confirmation .exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Payment confirmation .exe "C:\Users\user\Desktop\Payment confirmation .exe"
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exeJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmpJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exeJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exeJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile created: C:\Users\user\AppData\Roaming\QNRauI.exeJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEA4.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@11/10@14/1
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: C:\Users\user\Desktop\Payment confirmation .exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5036:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3600:120:WilError_01
      Source: C:\Users\user\Desktop\Payment confirmation .exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2616a878-9933-42e4-9fe0-3b57e29bc1f5}
      Source: C:\Users\user\Desktop\Payment confirmation .exeMutant created: \Sessions\1\BaseNamedObjects\lresUOKKCheNReqlZnYyzR
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: Payment confirmation .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Payment confirmation .exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: Payment confirmation .exe, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: QNRauI.exe.0.dr, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.2.Payment confirmation .exe.80000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.Payment confirmation .exe.80000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.0.Payment confirmation .exe.c0000.3.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.0.Payment confirmation .exe.c0000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.0.Payment confirmation .exe.c0000.1.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.2.Payment confirmation .exe.c0000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.0.Payment confirmation .exe.c0000.2.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.5.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.9.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.11.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.1.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.13.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.2.Payment confirmation .exe.6a0000.1.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      .NET source code contains method to dynamically call methods (often used by packers)Show sources
      Source: Payment confirmation .exe, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: QNRauI.exe.0.dr, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 0.2.Payment confirmation .exe.80000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 0.0.Payment confirmation .exe.80000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.0.Payment confirmation .exe.c0000.3.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.0.Payment confirmation .exe.c0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.0.Payment confirmation .exe.c0000.1.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.2.Payment confirmation .exe.c0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.0.Payment confirmation .exe.c0000.2.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.5.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.9.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.11.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.1.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.13.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.2.Payment confirmation .exe.6a0000.1.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2F970 pushfd ; iretd 0_2_00A2F971
      Source: initial sampleStatic PE information: section name: .text entropy: 7.96359768292
      Source: initial sampleStatic PE information: section name: .text entropy: 7.96359768292
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile created: C:\Users\user\AppData\Roaming\QNRauI.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile opened: C:\Users\user\Desktop\Payment confirmation .exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM3Show sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.242da04.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.730307873.0000000002611000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: Payment confirmation .exe, 00000000.00000002.730307873.0000000002611000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: Payment confirmation .exe, 00000000.00000002.730307873.0000000002611000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
      Source: C:\Users\user\Desktop\Payment confirmation .exe TID: 7000Thread sleep time: -39064s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exe TID: 7024Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4260Thread sleep time: -7378697629483816s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exe TID: 6760Thread sleep time: -10145709240540247s >= -30000sJump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4870Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3864Jump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeWindow / User API: threadDelayed 3782Jump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeWindow / User API: threadDelayed 5112Jump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeWindow / User API: foregroundWindowGot 769Jump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 39064Jump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\Payment confirmation .exeMemory written: C:\Users\user\Desktop\Payment confirmation .exe base: 400000 value starts with: 4D5AJump to behavior
      Adds a directory exclusion to Windows DefenderShow sources
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exeJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exeJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmpJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exeJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exeJump to behavior
      Source: Payment confirmation .exe, 0000000A.00000002.940923801.0000000002E46000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.941005381.0000000002E96000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.941108443.0000000002ED0000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.939580012.0000000001440000.00000002.00020000.sdmp, Payment confirmation .exe, 0000000A.00000002.941061864.0000000002ECE000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.944136866.000000000615D000.00000004.00000010.sdmp, Payment confirmation .exe, 0000000A.00000002.944077289.000000000601D000.00000004.00000010.sdmp, Payment confirmation .exe, 0000000A.00000002.944022787.0000000005DDC000.00000004.00000010.sdmp, Payment confirmation .exe, 0000000A.00000002.939799082.00000000029FB000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.939992078.0000000002AE8000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: Payment confirmation .exe, 0000000A.00000002.939580012.0000000001440000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: Payment confirmation .exe, 0000000A.00000002.939580012.0000000001440000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: Payment confirmation .exe, 0000000A.00000002.940923801.0000000002E46000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.939992078.0000000002AE8000.00000004.00000001.sdmpBinary or memory string: Program Manager|$
      Source: Payment confirmation .exe, 0000000A.00000002.939580012.0000000001440000.00000002.00020000.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Users\user\Desktop\Payment confirmation .exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Users\user\Desktop\Payment confirmation .exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTR

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: Payment confirmation .exe, 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Payment confirmation .exe, 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Payment confirmation .exe, 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Payment confirmation .exe, 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: Payment confirmation .exe, 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTR

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Masquerading1Input Capture11Security Software Discovery11Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools11LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing23Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 551433 Sample: Payment confirmation .exe Startdate: 12/01/2022 Architecture: WINDOWS Score: 100 37 naki.airdns.org 2->37 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 47 16 other signatures 2->47 8 Payment confirmation .exe 7 2->8         started        signatures3 process4 file5 27 C:\Users\user\AppData\Roaming\QNRauI.exe, PE32 8->27 dropped 29 C:\Users\user\...\QNRauI.exe:Zone.Identifier, ASCII 8->29 dropped 31 C:\Users\user\AppData\Local\...\tmpEEA4.tmp, XML 8->31 dropped 33 C:\Users\...\Payment confirmation .exe.log, ASCII 8->33 dropped 49 Adds a directory exclusion to Windows Defender 8->49 51 Injects a PE file into a foreign processes 8->51 12 Payment confirmation .exe 7 8->12         started        17 powershell.exe 25 8->17         started        19 schtasks.exe 1 8->19         started        21 Payment confirmation .exe 8->21         started        signatures6 process7 dnsIp8 39 naki.airdns.org 146.70.76.43, 49761, 49762, 49763 TENET-1ZA United Kingdom 12->39 35 C:\Users\user\AppData\Roaming\...\run.dat, SysEx 12->35 dropped 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->53 23 conhost.exe 17->23         started        25 conhost.exe 19->25         started        file9 signatures10 process11

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Payment confirmation .exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\QNRauI.exe100%Joe Sandbox ML

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      10.2.Payment confirmation .exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.2.Payment confirmation .exe.52e0000.7.unpack100%AviraTR/NanoCore.fadteDownload File
      10.0.Payment confirmation .exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.Payment confirmation .exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.Payment confirmation .exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.Payment confirmation .exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.Payment confirmation .exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://www.jiyu-kobo.co.jp/jp/C0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      37.120.210.211100%Avira URL Cloudmalware
      naki.airdns.org0%Avira URL Cloudsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.carterandcone.com0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/;0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/pt-b0%Avira URL Cloudsafe
      http://www.monotype.p0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/)0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.carterandcone.comM0%URL Reputationsafe
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.fontbureau.commfet0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/O0%URL Reputationsafe
      http://www.tiro.como0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/C0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/;0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/y0%URL Reputationsafe
      http://www.sakkal.com.0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/z0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
      http://www.monotype.0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/)0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/p0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.carterandcone.comwit0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/~Rm0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      naki.airdns.org
      146.70.76.43
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        37.120.210.211true
        • Avira URL Cloud: malware
        unknown
        naki.airdns.orgtrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designersGPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designersIUyPayment confirmation .exe, 00000000.00000003.680816196.0000000005433000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designers/?Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/jp/CPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/bThePayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                high
                http://www.tiro.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersPayment confirmation .exe, 00000000.00000003.684072387.0000000005433000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designersnoxPayment confirmation .exe, 00000000.00000003.694073095.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpfalse
                    high
                    http://www.goodfont.co.krPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comPayment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677385911.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677536867.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677732929.0000000005409000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/;Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cThePayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/pt-bPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.monotype.pPayment confirmation .exe, 00000000.00000003.687529964.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687463634.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687617708.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687425665.000000000544C000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designersTUFPayment confirmation .exe, 00000000.00000003.679938204.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.694073095.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.679784035.0000000005433000.00000004.00000001.sdmpfalse
                      high
                      http://www.galapagosdesign.com/DPleasePayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/)Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/Y0Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.krPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleasePayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePayment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpfalse
                          high
                          http://www.sakkal.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677972229.000000000542C000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comMPayment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                              high
                              http://www.galapagosdesign.com/Payment confirmation .exe, 00000000.00000003.687634241.0000000005433000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.commfetPayment confirmation .exe, 00000000.00000002.729385777.0000000000A74000.00000004.00000040.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/OPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers~Payment confirmation .exe, 00000000.00000003.683542352.0000000005433000.00000004.00000001.sdmpfalse
                                high
                                http://www.tiro.comoPayment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/LPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/CPayment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designersicoPayment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers/cabarga.htmldPayment confirmation .exe, 00000000.00000003.683286235.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683351862.0000000005433000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.carterandcone.comlPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/;Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/yPayment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.com.Payment confirmation .exe, 00000000.00000003.677944436.000000000542C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677972229.000000000542C000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/zPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.676069541.000000000542F000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-user.htmlPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.jiyu-kobo.co.jp/tPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlPayment confirmation .exe, 00000000.00000003.683286235.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683406802.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683351862.0000000005433000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/Y0/Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.monotype.Payment confirmation .exe, 00000000.00000003.680816196.0000000005433000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/jp/)Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/pPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comwitPayment confirmation .exe, 00000000.00000003.677558315.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677216510.0000000005403000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677385911.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677536867.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677732929.0000000005409000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designers8Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.galapagosdesign.com/~RmPayment confirmation .exe, 00000000.00000003.687703540.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687634241.0000000005433000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers~UlPayment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.fontbureau.com/designers/Payment confirmation .exe, 00000000.00000003.679784035.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.679682374.0000000005433000.00000004.00000001.sdmpfalse
                                                high

                                                Contacted IPs

                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs

                                                Public

                                                IPDomainCountryFlagASNASN NameMalicious
                                                146.70.76.43
                                                naki.airdns.orgUnited Kingdom
                                                2018TENET-1ZAtrue

                                                General Information

                                                Joe Sandbox Version:34.0.0 Boulder Opal
                                                Analysis ID:551433
                                                Start date:12.01.2022
                                                Start time:08:24:50
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 11m 29s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Sample file name:Payment confirmation .exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:22
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@11/10@14/1
                                                EGA Information:
                                                • Successful, ratio: 66.7%
                                                HDC Information:
                                                • Successful, ratio: 34.8% (good quality ratio 17.4%)
                                                • Quality average: 37.2%
                                                • Quality standard deviation: 38%
                                                HCA Information:
                                                • Successful, ratio: 99%
                                                • Number of executed functions: 52
                                                • Number of non-executed functions: 7
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Found application associated with file extension: .exe
                                                Warnings:
                                                Show All
                                                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, go.microsoft.com, store-images.s-microsoft.com, settings-win.data.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                • Execution Graph export aborted for target Payment confirmation .exe, PID 5432 because there are no executed function
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.

                                                Simulations

                                                Behavior and APIs

                                                TimeTypeDescription
                                                08:26:02API Interceptor831x Sleep call for process: Payment confirmation .exe modified
                                                08:26:12API Interceptor44x Sleep call for process: powershell.exe modified

                                                Joe Sandbox View / Context

                                                IPs

                                                No context

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                naki.airdns.orgPayment confirmation .exeGet hashmaliciousBrowse
                                                • 37.120.210.211
                                                Payment confirmation .exeGet hashmaliciousBrowse
                                                • 194.187.251.163
                                                dhlDocument .exeGet hashmaliciousBrowse
                                                • 37.120.210.211
                                                dhlDocument .exeGet hashmaliciousBrowse
                                                • 37.120.210.211
                                                MT103-Advance.Payment..pdf.exeGet hashmaliciousBrowse
                                                • 213.152.161.249
                                                dhlDocument .exeGet hashmaliciousBrowse
                                                • 37.120.210.211

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                TENET-1ZAb3astmode.x86Get hashmaliciousBrowse
                                                • 152.106.77.36
                                                4SiZKGBMOYGet hashmaliciousBrowse
                                                • 154.114.95.162
                                                8I4YXRv374Get hashmaliciousBrowse
                                                • 196.21.55.105
                                                UgNtYb3T3dGet hashmaliciousBrowse
                                                • 155.238.0.92
                                                loligang.armGet hashmaliciousBrowse
                                                • 155.240.194.123
                                                K0FLQjeV3NGet hashmaliciousBrowse
                                                • 146.230.43.157
                                                sora.x86Get hashmaliciousBrowse
                                                • 155.232.197.127
                                                DP035lJwIYGet hashmaliciousBrowse
                                                • 143.136.135.230
                                                jKira.arm7Get hashmaliciousBrowse
                                                • 146.68.57.79
                                                hVF2AR667HGet hashmaliciousBrowse
                                                • 146.69.137.46
                                                phantom.armGet hashmaliciousBrowse
                                                • 155.238.0.61
                                                Phth1g5WrSGet hashmaliciousBrowse
                                                • 146.70.175.226
                                                apep.x86Get hashmaliciousBrowse
                                                • 196.21.188.204
                                                cmVrSTjlzCGet hashmaliciousBrowse
                                                • 146.141.187.92
                                                arm-20211227-1850Get hashmaliciousBrowse
                                                • 152.116.100.79
                                                teuS3WQvbSGet hashmaliciousBrowse
                                                • 143.128.168.145
                                                1bQEi8dbIiGet hashmaliciousBrowse
                                                • 146.70.175.216
                                                c0r0n4x.x86Get hashmaliciousBrowse
                                                • 146.239.195.224
                                                CjQiyGmTp3Get hashmaliciousBrowse
                                                • 143.128.168.136
                                                arm6-20211225-0506Get hashmaliciousBrowse
                                                • 146.232.26.16

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment confirmation .exe.log
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):1310
                                                Entropy (8bit):5.345651901398759
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                                                MD5:A9EFF9253CAF99EC8665E41D736DDAED
                                                SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                                                SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                                                SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                                                Malicious:true
                                                Reputation:moderate, very likely benign file
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):22280
                                                Entropy (8bit):5.603448558149079
                                                Encrypted:false
                                                SSDEEP:384:GtCDm0k8v6v30rXSJScSBKnYjultIab7Y9gtbSJ3xyT1MaDZlbAV7O4l6ZBDI+ip:eQ23MXE4KYClt17hcwC6fwoVg
                                                MD5:438CEF22F7B9AB115F27C9E03ED52A92
                                                SHA1:3E50A0EF10FB3EE05A1772B685114078755E461C
                                                SHA-256:4DDC221F1F2DA6CD48D3117C60008429D9F2631F0BF7C5DF8927989ECBB05CCC
                                                SHA-512:BB186A39B67EA9D43ED556451FCE481451C5A8F995867FC84CD7D1815D1D5A6BB1323710979FF0CF0378E2C5439318E3ED42CEBEA7212213AA293BC2763DFA0C
                                                Malicious:false
                                                Reputation:low
                                                Preview: @...e...........y.......h.............y...I..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2qnk0ivh.iyj.ps1
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:very short file (no magic)
                                                Category:dropped
                                                Size (bytes):1
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3:U:U
                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview: 1
                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mevy52tz.tt5.psm1
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:very short file (no magic)
                                                Category:dropped
                                                Size (bytes):1
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3:U:U
                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                Malicious:false
                                                Preview: 1
                                                C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:XML 1.0 document, ASCII text
                                                Category:dropped
                                                Size (bytes):1593
                                                Entropy (8bit):5.1360806454884385
                                                Encrypted:false
                                                SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtadxvn:cgeKwYrFdOFzOzN33ODOiDdKrsuT+v
                                                MD5:B0A91C23E82AA9831131A946DC8882B2
                                                SHA1:6ACB72396925F2655F17259CB41980C1E77B5BBB
                                                SHA-256:830508EBB4A30C675781AA7A61A4A3B41379B090CC472B86368AA906849E39B8
                                                SHA-512:3B0104905227E5357708DE138902E7FD99DD89145A829B1EFC5878097A3DC49CCF0E0162629D019E30B39DA89D5E1050553A7F749A9B29AC47D899B9DAC44158
                                                Malicious:true
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):232
                                                Entropy (8bit):7.024371743172393
                                                Encrypted:false
                                                SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                                MD5:32D0AAE13696FF7F8AF33B2D22451028
                                                SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                                SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                                SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                                Malicious:false
                                                Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:SysEx File - Twister
                                                Category:dropped
                                                Size (bytes):8
                                                Entropy (8bit):3.0
                                                Encrypted:false
                                                SSDEEP:3:p2Bn:e
                                                MD5:6D4C80C6B89E030207C12FF4661B6118
                                                SHA1:7401D0D745A13BD2905E25C23E65421C382391A9
                                                SHA-256:EBABE9E7478812E1D324E5F7D94EFA80B73BAB3E1A3CFC9E155047BC3858344F
                                                SHA-512:812A64696E0931C6B19AA555B24F21003D58758276ACE42F45F9A58BFEFD67FD3AA2089B2F17285D6D498507E8B2411BEB11D9B93490F849ABC8225A911A6741
                                                Malicious:true
                                                Preview: .%7...H
                                                C:\Users\user\AppData\Roaming\QNRauI.exe
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):542720
                                                Entropy (8bit):7.954488841460159
                                                Encrypted:false
                                                SSDEEP:12288:bXGyj7pcvY2GblmQ1S3IAHQ7RBw/73iErP:fTc3bwNBwuEr
                                                MD5:AA035026516778019F8B8BD0E224FC03
                                                SHA1:EFAE7E259B4581830C7E6BFEB94ED6DD25A54229
                                                SHA-256:39C5635EA42D63FE84500B9760FBE56E0FD3243007700749609BCA1CD8D9E5D4
                                                SHA-512:A2CBCE6A6597479167089339504B7BC39BAE9845F2295397062F2FFE1B79037A5640208663A5E208D87856CEEADD1EFE061B933ED69A79D572BD597F3FF75899
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....v.a..............0..<..........NZ... ...`....@.. ....................................@..................................Y..O....`............................................................................... ............... ..H............text...T:... ...<.................. ..`.rsrc........`.......>..............@..@.reloc...............F..............@..B................0Z......H........L...\......6...|...............................................&.(......**..(......*....0...........r...pr...p.QsF....+..*..0...........r;..prA..p.EsF....+..*..0...........rw..pr...p.VsF....+..*..0...........r...pr...p.JsF....+..*..0...........r...pr...p.ZsF....+..*..0...........r+..pr1..p.Z.MsG....+..*....0...........rg..pro..p.Z.MsG....+..*....0...........r...pr...p.Z.MsG....+..*....0...........r...pr...ps=....+..*....0...........r...pr#..ps=....+..*....0..........
                                                C:\Users\user\AppData\Roaming\QNRauI.exe:Zone.Identifier
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Preview: [ZoneTransfer]....ZoneId=0
                                                C:\Users\user\Documents\20220112\PowerShell_transcript.830021.GhMaXGHf.20220112082610.txt
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):5773
                                                Entropy (8bit):5.39117162081354
                                                Encrypted:false
                                                SSDEEP:96:BZIjKNxqDo1ZSZNjKNxqDo1ZxrpzjZ/jKNxqDo1Zbajj5Zh:x
                                                MD5:322C10DE7FC412A3E88EABCEB5DD0130
                                                SHA1:51593CE60CD26DD9EF22B0784C44CB381CE5D4A8
                                                SHA-256:43AD0D4351316231CFCB26AC59E6F01839779EEFF38D961A10D251ACE4172D9B
                                                SHA-512:5BECB37FE14E9735811D84CD391891E276FE903A0CCD0D42D3782AEE792A06F01B9A37A72FDC207F331CADB7894CF933CE35F579AED2A73B55AFB78B0A052B83
                                                Malicious:false
                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20220112082611..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 830021 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\QNRauI.exe..Process ID: 3604..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220112082611..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\QNRauI.exe..**********************..Windows PowerShell transcript start..Start time: 20220112083015..Username: computer\user..RunAs User: computer\user..Confi

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.954488841460159
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:Payment confirmation .exe
                                                File size:542720
                                                MD5:aa035026516778019f8b8bd0e224fc03
                                                SHA1:efae7e259b4581830c7e6bfeb94ed6dd25a54229
                                                SHA256:39c5635ea42d63fe84500b9760fbe56e0fd3243007700749609bca1cd8d9e5d4
                                                SHA512:a2cbce6a6597479167089339504b7bc39bae9845f2295397062f2ffe1b79037a5640208663a5e208d87856ceeadd1efe061b933ed69a79d572bd597f3ff75899
                                                SSDEEP:12288:bXGyj7pcvY2GblmQ1S3IAHQ7RBw/73iErP:fTc3bwNBwuEr
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....v.a..............0..<..........NZ... ...`....@.. ....................................@................................

                                                File Icon

                                                Icon Hash:00828e8e8686b000

                                                Static PE Info

                                                General

                                                Entrypoint:0x485a4e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x61DE7680 [Wed Jan 12 06:34:40 2022 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x859fc0x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x6d4.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x83a540x83c00False0.961252520161data7.96359768292IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0x860000x6d40x800False0.37109375data3.68471441086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x880000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_VERSION0x860900x444data
                                                RT_MANIFEST0x864e40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyrightCopyright Development In Progress Ltd 2015
                                                Assembly Version2.0.0.0
                                                InternalNameOnDeserializingAttribu.exe
                                                FileVersion2.0.0.0
                                                CompanyNameDevelopment In Progress Ltd
                                                LegalTrademarks
                                                CommentsA simple mechanism to maintain state for an activity based workflow
                                                ProductNameDipState
                                                ProductVersion2.0.0.0
                                                FileDescriptionDipState
                                                OriginalFilenameOnDeserializingAttribu.exe

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 12, 2022 08:26:21.496448994 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:22.120800972 CET5628149761146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:22.120923042 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:22.169342041 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:22.806607962 CET5628149761146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:22.886548042 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:23.670886993 CET5628149761146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:23.670964003 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:24.113238096 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:24.461231947 CET5628149761146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:24.463196993 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:28.601921082 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:29.336673975 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:29.336815119 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:29.337460041 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:30.403642893 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:30.403872967 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:31.048769951 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:31.049668074 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:31.680993080 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:31.681144953 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:32.112807035 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:32.365627050 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:32.365787029 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:36.703120947 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:37.318804026 CET5628149763146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:37.318968058 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:37.320342064 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:38.045265913 CET5628149763146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:38.045907974 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:38.754287958 CET5628149763146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:38.754364967 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:39.186594963 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:39.422841072 CET5628149763146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:39.422904968 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:44.189121962 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:44.937760115 CET5628149764146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:44.938009977 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:45.537900925 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:46.152734995 CET5628149764146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:46.153064966 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:46.791004896 CET5628149764146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:46.791949987 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:47.401065111 CET5628149764146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:47.441382885 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:47.587512970 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:52.017040014 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:52.662681103 CET5628149782146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:52.663507938 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:52.664336920 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:53.306962013 CET5628149782146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:53.307307005 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:53.926824093 CET5628149782146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:53.926914930 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:54.590934992 CET5628149782146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:54.614583015 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:59.051279068 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:59.664710999 CET5628149800146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:59.664861917 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:59.665734053 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:00.306605101 CET5628149800146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:00.310446024 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:00.944751978 CET5628149800146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:00.944825888 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:01.615020990 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:01.750566959 CET5628149800146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:01.750693083 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:05.965873003 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:06.588663101 CET5628149807146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:06.588757992 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:06.589562893 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:07.352962971 CET5628149807146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:07.353127003 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:08.115328074 CET5628149807146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:08.115432024 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:08.677973032 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:08.926760912 CET5628149807146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:08.926947117 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:13.191730022 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:13.806905031 CET5628149809146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:13.807552099 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:13.808307886 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:14.548984051 CET5628149809146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:14.551913023 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:15.320391893 CET5628149809146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:15.320805073 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:15.757601976 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:16.172713041 CET5628149809146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:16.172801018 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:20.217061996 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:20.880790949 CET5628149827146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:20.881078005 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:20.888781071 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:21.752861023 CET5628149827146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:21.752984047 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:22.616928101 CET5628149827146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:22.617002010 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:22.913781881 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:23.307008028 CET5628149827146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:23.307956934 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:27.186053991 CET4983356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:28.458776951 CET5628149833146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:28.458915949 CET4983356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:28.459662914 CET4983356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:29.107300997 CET5628149833146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:29.107474089 CET4983356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:30.047758102 CET5628149833146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:30.047956944 CET4983356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:30.862916946 CET5628149833146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:30.913831949 CET4983356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:30.961359978 CET4983356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:35.924621105 CET4983456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:36.596743107 CET5628149834146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:36.597906113 CET4983456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:37.272458076 CET4983456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:37.914793015 CET5628149834146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:37.914933920 CET4983456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:38.596807957 CET5628149834146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:38.596961975 CET4983456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:39.305906057 CET4983456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:39.438813925 CET5628149834146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:39.438925028 CET4983456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:43.647303104 CET4983656281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:44.255228043 CET5628149836146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:44.255361080 CET4983656281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:44.265652895 CET4983656281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:45.160152912 CET5628149836146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:45.160247087 CET4983656281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:45.925698042 CET5628149836146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:45.925803900 CET4983656281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:46.306391001 CET4983656281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:46.539414883 CET5628149836146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:46.539520979 CET4983656281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:50.812954903 CET4984056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:51.493918896 CET5628149840146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:51.494250059 CET4984056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:51.495151043 CET4984056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:52.282653093 CET5628149840146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:52.283170938 CET4984056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:52.918529034 CET5628149840146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:52.918648958 CET4984056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:53.775053978 CET5628149840146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:53.778959990 CET4984056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:54.307682037 CET4984056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:55.046422958 CET5628149840146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:55.046506882 CET4984056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:58.344065905 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:58.994076014 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:58.994205952 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:58.994560003 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:59.621408939 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:59.621694088 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:00.710805893 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:00.711735010 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:00.775665998 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:01.378849030 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:01.379713058 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.036911011 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.062705994 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.062966108 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.063015938 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.063030005 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.063043118 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.063061953 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.063074112 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.063082933 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.063087940 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.063091040 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.063101053 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.063149929 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.063159943 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.063163042 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.063178062 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.063828945 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.063931942 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.680911064 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.680958033 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.681006908 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.681034088 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.681062937 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.681066036 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.681097031 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.681099892 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.681112051 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.681128979 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.681163073 CET4984156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:28:02.681644917 CET5628149841146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:28:02.681896925 CET5628149841146.70.76.43192.168.2.4

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 12, 2022 08:26:21.358510017 CET6238953192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:21.463951111 CET53623898.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:28.396239996 CET4991053192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:28.600332975 CET53499108.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:36.512564898 CET5585453192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:36.701642990 CET53558548.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:44.168963909 CET6454953192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:44.187479019 CET53645498.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:51.997921944 CET6311653192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:52.014723063 CET53631168.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:59.029360056 CET6407853192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:59.048402071 CET53640788.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:05.947813034 CET6172153192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:05.964391947 CET53617218.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:13.125575066 CET5125553192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:13.144364119 CET53512558.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:20.194072008 CET6152253192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:20.212605953 CET53615228.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:27.167675972 CET5233753192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:27.183885098 CET53523378.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:35.424280882 CET5504653192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:35.440875053 CET53550468.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:43.627265930 CET4928553192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:43.646083117 CET53492858.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:50.791979074 CET6087553192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:50.810436010 CET53608758.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:58.324325085 CET5644853192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:58.343009949 CET53564488.8.8.8192.168.2.4

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Jan 12, 2022 08:26:21.358510017 CET192.168.2.48.8.8.80xa905Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:28.396239996 CET192.168.2.48.8.8.80x5745Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:36.512564898 CET192.168.2.48.8.8.80xf50Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:44.168963909 CET192.168.2.48.8.8.80x6babStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:51.997921944 CET192.168.2.48.8.8.80xf097Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:59.029360056 CET192.168.2.48.8.8.80x5e15Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:05.947813034 CET192.168.2.48.8.8.80x7c75Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:13.125575066 CET192.168.2.48.8.8.80xb2dfStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:20.194072008 CET192.168.2.48.8.8.80x37dStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:27.167675972 CET192.168.2.48.8.8.80x4dd2Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:35.424280882 CET192.168.2.48.8.8.80x70e1Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:43.627265930 CET192.168.2.48.8.8.80x150bStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:50.791979074 CET192.168.2.48.8.8.80xa18aStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:58.324325085 CET192.168.2.48.8.8.80xf965Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Jan 12, 2022 08:26:21.463951111 CET8.8.8.8192.168.2.40xa905No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:28.600332975 CET8.8.8.8192.168.2.40x5745No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:36.701642990 CET8.8.8.8192.168.2.40xf50No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:44.187479019 CET8.8.8.8192.168.2.40x6babNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:52.014723063 CET8.8.8.8192.168.2.40xf097No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:59.048402071 CET8.8.8.8192.168.2.40x5e15No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:05.964391947 CET8.8.8.8192.168.2.40x7c75No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:13.144364119 CET8.8.8.8192.168.2.40xb2dfNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:20.212605953 CET8.8.8.8192.168.2.40x37dNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:27.183885098 CET8.8.8.8192.168.2.40x4dd2No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:35.440875053 CET8.8.8.8192.168.2.40x70e1No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:43.646083117 CET8.8.8.8192.168.2.40x150bNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:50.810436010 CET8.8.8.8192.168.2.40xa18aNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:58.343009949 CET8.8.8.8192.168.2.40xf965No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)

                                                Code Manipulations

                                                Statistics

                                                CPU Usage

                                                Click to jump to process

                                                Memory Usage

                                                Click to jump to process

                                                High Level Behavior Distribution

                                                Click to dive into process behavior distribution

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:08:25:51
                                                Start date:12/01/2022
                                                Path:C:\Users\user\Desktop\Payment confirmation .exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Payment confirmation .exe"
                                                Imagebase:0x80000
                                                File size:542720 bytes
                                                MD5 hash:AA035026516778019F8B8BD0E224FC03
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.730307873.0000000002611000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                General

                                                Start time:08:26:09
                                                Start date:12/01/2022
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe
                                                Imagebase:0x1210000
                                                File size:430592 bytes
                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Reputation:high

                                                General

                                                Start time:08:26:09
                                                Start date:12/01/2022
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:26:10
                                                Start date:12/01/2022
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp
                                                Imagebase:0x1060000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:26:12
                                                Start date:12/01/2022
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:26:13
                                                Start date:12/01/2022
                                                Path:C:\Users\user\Desktop\Payment confirmation .exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Users\user\Desktop\Payment confirmation .exe
                                                Imagebase:0xc0000
                                                File size:542720 bytes
                                                MD5 hash:AA035026516778019F8B8BD0E224FC03
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                General

                                                Start time:08:26:14
                                                Start date:12/01/2022
                                                Path:C:\Users\user\Desktop\Payment confirmation .exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\Payment confirmation .exe
                                                Imagebase:0x6a0000
                                                File size:542720 bytes
                                                MD5 hash:AA035026516778019F8B8BD0E224FC03
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, Author: Florian Roth
                                                Reputation:low

                                                Disassembly

                                                Code Analysis

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:13.6%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:253
                                                  Total number of Limit Nodes:11

                                                  Graph

                                                  execution_graph 19300 7367ac7 19301 7367acf 19300->19301 19302 7367c52 19301->19302 19304 7369eb8 12 API calls 19301->19304 19305 7369ec8 12 API calls 19301->19305 19303 7367baf 19304->19303 19305->19303 19306 a298b0 19307 a298f2 19306->19307 19308 a298f8 GetModuleHandleW 19306->19308 19307->19308 19309 a29925 19308->19309 19310 a240d0 19311 a240e2 19310->19311 19312 a240ee 19311->19312 19316 a241e8 19311->19316 19321 a23c64 19312->19321 19314 a24119 19317 a2420d 19316->19317 19325 a242e8 19317->19325 19329 a242d9 19317->19329 19322 a23c6f 19321->19322 19337 a251ac 19322->19337 19324 a26a25 19324->19314 19326 a2430f 19325->19326 19327 a243ec 19326->19327 19333 a23de8 19326->19333 19330 a2430f 19329->19330 19331 a23de8 CreateActCtxA 19330->19331 19332 a243ec 19330->19332 19331->19332 19334 a25378 CreateActCtxA 19333->19334 19336 a2543b 19334->19336 19338 a251b7 19337->19338 19341 a25800 19338->19341 19340 a26af5 19340->19324 19342 a2580b 19341->19342 19345 a25830 19342->19345 19344 a26bda 19344->19340 19346 a2583b 19345->19346 19349 a25860 19346->19349 19348 a26cca 19348->19344 19350 a2586b 19349->19350 19351 a2741c 19350->19351 19354 a2b2f0 19350->19354 19359 a2b300 19350->19359 19351->19348 19355 a2b321 19354->19355 19356 a2b345 19355->19356 19364 a2b5a8 19355->19364 19368 a2b5b8 19355->19368 19356->19351 19360 a2b321 19359->19360 19361 a2b345 19360->19361 19362 a2b5a8 3 API calls 19360->19362 19363 a2b5b8 3 API calls 19360->19363 19361->19351 19362->19361 19363->19361 19366 a2b5c5 19364->19366 19365 a2b5ff 19365->19356 19366->19365 19372 a297b8 19366->19372 19369 a2b5c5 19368->19369 19370 a297b8 3 API calls 19369->19370 19371 a2b5ff 19369->19371 19370->19371 19371->19356 19373 a297c3 19372->19373 19375 a2c2f8 19373->19375 19376 a29880 19373->19376 19375->19375 19377 a2988b 19376->19377 19378 a25860 3 API calls 19377->19378 19379 a2c367 19377->19379 19378->19379 19383 a2e0e8 19379->19383 19392 a2e0d8 19379->19392 19380 a2c3a0 19380->19375 19385 a2e119 19383->19385 19386 a2e20a 19383->19386 19384 a2e125 19384->19380 19385->19384 19388 a2e55a LoadLibraryExW 19385->19388 19389 a2e568 LoadLibraryExW 19385->19389 19386->19380 19387 a2e165 19390 a2ef20 CreateWindowExW CreateWindowExW 19387->19390 19391 a2ef30 CreateWindowExW CreateWindowExW 19387->19391 19388->19387 19389->19387 19390->19386 19391->19386 19394 a2e119 19392->19394 19395 a2e20a 19392->19395 19393 a2e125 19393->19380 19394->19393 19397 a2e55a LoadLibraryExW 19394->19397 19398 a2e568 LoadLibraryExW 19394->19398 19395->19380 19396 a2e165 19399 a2ef20 CreateWindowExW CreateWindowExW 19396->19399 19400 a2ef30 CreateWindowExW CreateWindowExW 19396->19400 19397->19396 19398->19396 19399->19395 19400->19395 19401 a2b6d0 19402 a2b736 19401->19402 19406 a2b882 19402->19406 19409 a2b890 19402->19409 19403 a2b7e5 19412 a29840 19406->19412 19410 a2b8be 19409->19410 19411 a29840 DuplicateHandle 19409->19411 19410->19403 19411->19410 19413 a2b8f8 DuplicateHandle 19412->19413 19414 a2b8be 19413->19414 19414->19403 19415 a291d0 19416 a291df 19415->19416 19419 a292b8 19415->19419 19424 a292c8 19415->19424 19420 a292db 19419->19420 19421 a292eb 19420->19421 19429 a29948 19420->19429 19433 a29958 19420->19433 19421->19416 19425 a292db 19424->19425 19426 a292eb 19425->19426 19427 a29948 LoadLibraryExW 19425->19427 19428 a29958 LoadLibraryExW 19425->19428 19426->19416 19427->19426 19428->19426 19430 a2996c 19429->19430 19432 a29991 19430->19432 19437 a294b8 19430->19437 19432->19421 19434 a2996c 19433->19434 19435 a29991 19434->19435 19436 a294b8 LoadLibraryExW 19434->19436 19435->19421 19436->19435 19438 a29b38 LoadLibraryExW 19437->19438 19440 a29bb1 19438->19440 19440->19432 19111 7367913 19112 73677fd 19111->19112 19113 7367a71 19112->19113 19117 7369eb8 19112->19117 19123 7369ec8 19112->19123 19114 7367baf 19118 7369ee2 19117->19118 19129 7369f22 19118->19129 19140 7369f28 19118->19140 19151 7369f90 19118->19151 19119 7369f10 19119->19114 19124 7369ee2 19123->19124 19126 7369f22 12 API calls 19124->19126 19127 7369f90 12 API calls 19124->19127 19128 7369f28 12 API calls 19124->19128 19125 7369f10 19125->19114 19126->19125 19127->19125 19128->19125 19130 7369f45 19129->19130 19137 7369f85 19130->19137 19163 736a60f 19130->19163 19167 736a4ff 19130->19167 19172 736ac3e 19130->19172 19177 736a6e0 19130->19177 19182 736aab2 19130->19182 19190 736ad64 19130->19190 19194 736a449 19130->19194 19198 736ae18 19130->19198 19137->19119 19141 7369f45 19140->19141 19142 736ad64 2 API calls 19141->19142 19143 736aab2 4 API calls 19141->19143 19144 736a6e0 2 API calls 19141->19144 19145 736ac3e 2 API calls 19141->19145 19146 736a4ff 2 API calls 19141->19146 19147 736a60f 2 API calls 19141->19147 19148 7369f85 19141->19148 19149 736ae18 2 API calls 19141->19149 19150 736a449 2 API calls 19141->19150 19142->19148 19143->19148 19144->19148 19145->19148 19146->19148 19147->19148 19148->19119 19149->19148 19150->19148 19152 7369f77 19151->19152 19153 7369f93 19151->19153 19154 736ad64 2 API calls 19152->19154 19155 736aab2 4 API calls 19152->19155 19156 7369f85 19152->19156 19157 736a6e0 2 API calls 19152->19157 19158 736ac3e 2 API calls 19152->19158 19159 736a4ff 2 API calls 19152->19159 19160 736a60f 2 API calls 19152->19160 19161 736ae18 2 API calls 19152->19161 19162 736a449 2 API calls 19152->19162 19153->19119 19154->19156 19155->19156 19156->19119 19157->19156 19158->19156 19159->19156 19160->19156 19161->19156 19162->19156 19202 7367120 19163->19202 19206 7367128 19163->19206 19164 736a63d 19168 736a50e 19167->19168 19169 736a57c 19168->19169 19210 736b0f0 19168->19210 19215 736b108 19168->19215 19173 736ac47 19172->19173 19228 736b3f0 19173->19228 19233 736b3e0 19173->19233 19174 736ac80 19174->19137 19178 736a705 19177->19178 19179 736a729 19177->19179 19180 7367120 WriteProcessMemory 19178->19180 19181 7367128 WriteProcessMemory 19178->19181 19180->19179 19181->19179 19183 736aac6 19182->19183 19185 736a971 19183->19185 19246 736b1e0 19183->19246 19251 736b1d0 19183->19251 19184 736ab1b 19188 7367120 WriteProcessMemory 19184->19188 19189 7367128 WriteProcessMemory 19184->19189 19188->19185 19189->19185 19264 736b370 19190->19264 19269 736b380 19190->19269 19191 736ad85 19274 73673a4 19194->19274 19278 73673b0 19194->19278 19282 7367211 19198->19282 19286 7367218 19198->19286 19199 736a4d0 19203 7367170 WriteProcessMemory 19202->19203 19205 73671c7 19203->19205 19205->19164 19207 7367170 WriteProcessMemory 19206->19207 19209 73671c7 19207->19209 19209->19164 19211 736b122 19210->19211 19220 7366f90 19211->19220 19224 7366f88 19211->19224 19212 736b154 19212->19169 19216 736b122 19215->19216 19218 7366f90 GetThreadContext 19216->19218 19219 7366f88 GetThreadContext 19216->19219 19217 736b154 19217->19169 19218->19217 19219->19217 19221 7366fd5 GetThreadContext 19220->19221 19223 736701d 19221->19223 19223->19212 19225 7366fd5 GetThreadContext 19224->19225 19227 736701d 19225->19227 19227->19212 19229 736b40a 19228->19229 19238 7366ed8 19229->19238 19242 7366ee0 19229->19242 19230 736b439 19230->19174 19234 736b40a 19233->19234 19236 7366ee0 ResumeThread 19234->19236 19237 7366ed8 ResumeThread 19234->19237 19235 736b439 19235->19174 19236->19235 19237->19235 19239 7366f20 ResumeThread 19238->19239 19241 7366f51 19239->19241 19241->19230 19243 7366f20 ResumeThread 19242->19243 19245 7366f51 19243->19245 19245->19230 19247 736b1fa 19246->19247 19256 7367060 19247->19256 19260 7367068 19247->19260 19248 736b235 19248->19184 19252 736b1fa 19251->19252 19254 7367060 VirtualAllocEx 19252->19254 19255 7367068 VirtualAllocEx 19252->19255 19253 736b235 19253->19184 19254->19253 19255->19253 19257 73670a8 VirtualAllocEx 19256->19257 19259 73670e5 19257->19259 19259->19248 19261 73670a8 VirtualAllocEx 19260->19261 19263 73670e5 19261->19263 19263->19248 19265 736b39a 19264->19265 19267 7366f90 GetThreadContext 19265->19267 19268 7366f88 GetThreadContext 19265->19268 19266 736b3cc 19266->19191 19267->19266 19268->19266 19270 736b39a 19269->19270 19272 7366f90 GetThreadContext 19270->19272 19273 7366f88 GetThreadContext 19270->19273 19271 736b3cc 19271->19191 19272->19271 19273->19271 19275 7367439 CreateProcessA 19274->19275 19277 73675fb 19275->19277 19279 7367439 CreateProcessA 19278->19279 19281 73675fb 19279->19281 19283 7367263 ReadProcessMemory 19282->19283 19285 73672a7 19283->19285 19285->19199 19287 7367263 ReadProcessMemory 19286->19287 19289 73672a7 19287->19289 19289->19199 19290 736b4b8 19291 736b4de 19290->19291 19292 736b643 19290->19292 19291->19292 19295 736b730 19291->19295 19298 736b738 PostMessageW 19291->19298 19296 736b738 PostMessageW 19295->19296 19297 736b7a4 19296->19297 19297->19291 19299 736b7a4 19298->19299 19299->19291

                                                  Executed Functions

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 263 a2fbe0-a2fc51 264 a2fc52-a2fc80 263->264 264->264 265 a2fc82-a2fcef 264->265 266 a2fcf1-a2fd18 call a2de0c 265->266 267 a2fd25-a2fd9e 265->267 271 a2fd1d-a2fd1e 266->271 268 a2fda0-a2fda6 267->268 269 a2fda9-a2fdb0 267->269 268->269 272 a2fdb2-a2fdb8 269->272 273 a2fdbb-a2fe5a CreateWindowExW 269->273 272->273 275 a2fe63-a2fe9b 273->275 276 a2fe5c-a2fe62 273->276 280 a2fea8 275->280 281 a2fe9d-a2fea0 275->281 276->275 282 a2fea9 280->282 281->280 282->282
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9ce5fb46a38da5cfc3bb31eaf9e6986a4d72056042aed21c002351ae391d2de6
                                                  • Instruction ID: ab75bb4b165b431e81b5d79f5c1c47a2f3212689fbb39e696b935e3fc08c1879
                                                  • Opcode Fuzzy Hash: 9ce5fb46a38da5cfc3bb31eaf9e6986a4d72056042aed21c002351ae391d2de6
                                                  • Instruction Fuzzy Hash: 56916C71C093889FCB06CFA4C8909DDBFB1EF4B304F1A85AAE485AB263D7345956CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00A29916
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00A2B8BE,?,?,?,?,?), ref: 00A2B97F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: Handle$DuplicateModule
                                                  • String ID:
                                                  • API String ID: 2228235409-0
                                                  • Opcode ID: 6d0f8e6f85d843d7c358e2829279a3d440a96f61ca9ae4b757cd9d98836af3c8
                                                  • Instruction ID: 9ece6112a31797dbaeaa44a8b59b308dbc663bb91ee62a1776eab394f4910156
                                                  • Opcode Fuzzy Hash: 6d0f8e6f85d843d7c358e2829279a3d440a96f61ca9ae4b757cd9d98836af3c8
                                                  • Instruction Fuzzy Hash: 884123B5D003489FCB10CF9AD584ADEBBF4EB49324F14806AE818B7210D778A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 283 73673a4-7367445 285 7367447-7367451 283->285 286 736747e-736749e 283->286 285->286 287 7367453-7367455 285->287 293 73674d7-7367506 286->293 294 73674a0-73674aa 286->294 288 7367457-7367461 287->288 289 7367478-736747b 287->289 291 7367465-7367474 288->291 292 7367463 288->292 289->286 291->291 295 7367476 291->295 292->291 300 736753f-73675f9 CreateProcessA 293->300 301 7367508-7367512 293->301 294->293 296 73674ac-73674ae 294->296 295->289 298 73674b0-73674ba 296->298 299 73674d1-73674d4 296->299 302 73674be-73674cd 298->302 303 73674bc 298->303 299->293 314 7367602-7367688 300->314 315 73675fb-7367601 300->315 301->300 304 7367514-7367516 301->304 302->302 305 73674cf 302->305 303->302 306 7367518-7367522 304->306 307 7367539-736753c 304->307 305->299 309 7367526-7367535 306->309 310 7367524 306->310 307->300 309->309 311 7367537 309->311 310->309 311->307 325 736768a-736768e 314->325 326 7367698-736769c 314->326 315->314 325->326 327 7367690 325->327 328 736769e-73676a2 326->328 329 73676ac-73676b0 326->329 327->326 328->329 330 73676a4 328->330 331 73676b2-73676b6 329->331 332 73676c0-73676c4 329->332 330->329 331->332 333 73676b8 331->333 334 73676d6-73676dd 332->334 335 73676c6-73676cc 332->335 333->332 336 73676f4 334->336 337 73676df-73676ee 334->337 335->334 339 73676f5 336->339 337->336 339->339
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073675E6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 039c690969469ca98309d0e4abb608984b949a186c655a4160bafee48916b777
                                                  • Instruction ID: f68db090d86441f36477f2f5626af3131fb2efdbe59a566e391a36807fe52fd0
                                                  • Opcode Fuzzy Hash: 039c690969469ca98309d0e4abb608984b949a186c655a4160bafee48916b777
                                                  • Instruction Fuzzy Hash: 10A19EB1D0022ACFEB10CF68C8857EDBBB2FF44318F1581A9D809A7284DB749985CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 340 73673b0-7367445 342 7367447-7367451 340->342 343 736747e-736749e 340->343 342->343 344 7367453-7367455 342->344 350 73674d7-7367506 343->350 351 73674a0-73674aa 343->351 345 7367457-7367461 344->345 346 7367478-736747b 344->346 348 7367465-7367474 345->348 349 7367463 345->349 346->343 348->348 352 7367476 348->352 349->348 357 736753f-73675f9 CreateProcessA 350->357 358 7367508-7367512 350->358 351->350 353 73674ac-73674ae 351->353 352->346 355 73674b0-73674ba 353->355 356 73674d1-73674d4 353->356 359 73674be-73674cd 355->359 360 73674bc 355->360 356->350 371 7367602-7367688 357->371 372 73675fb-7367601 357->372 358->357 361 7367514-7367516 358->361 359->359 362 73674cf 359->362 360->359 363 7367518-7367522 361->363 364 7367539-736753c 361->364 362->356 366 7367526-7367535 363->366 367 7367524 363->367 364->357 366->366 368 7367537 366->368 367->366 368->364 382 736768a-736768e 371->382 383 7367698-736769c 371->383 372->371 382->383 384 7367690 382->384 385 736769e-73676a2 383->385 386 73676ac-73676b0 383->386 384->383 385->386 387 73676a4 385->387 388 73676b2-73676b6 386->388 389 73676c0-73676c4 386->389 387->386 388->389 390 73676b8 388->390 391 73676d6-73676dd 389->391 392 73676c6-73676cc 389->392 390->389 393 73676f4 391->393 394 73676df-73676ee 391->394 392->391 396 73676f5 393->396 394->393 396->396
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073675E6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 7419796525c2c6f3d3b62d098f37cfda4e2f911e8bde26bfb264de57abcd13a9
                                                  • Instruction ID: abc0b20f5a12a28919d889e6c00425c9dc0b9b3e04ba0674a3ac8e8fe96afda5
                                                  • Opcode Fuzzy Hash: 7419796525c2c6f3d3b62d098f37cfda4e2f911e8bde26bfb264de57abcd13a9
                                                  • Instruction Fuzzy Hash: E5918FB1D0022ACFEB11CF68C8857EDBBB2BF44318F5581A9D809A7254DB749985CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1127 a2fd2c-a2fd9e 1128 a2fda0-a2fda6 1127->1128 1129 a2fda9-a2fdb0 1127->1129 1128->1129 1130 a2fdb2-a2fdb8 1129->1130 1131 a2fdbb-a2fdf3 1129->1131 1130->1131 1132 a2fdfb-a2fe5a CreateWindowExW 1131->1132 1133 a2fe63-a2fe9b 1132->1133 1134 a2fe5c-a2fe62 1132->1134 1138 a2fea8 1133->1138 1139 a2fe9d-a2fea0 1133->1139 1134->1133 1140 a2fea9 1138->1140 1139->1138 1140->1140
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00A2FE4A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: dd1534cdfca61dad581922c286f6b4958bce6ff540665922f7c541d32ce2bea1
                                                  • Instruction ID: 23b0d741569615151a62f697f430c5c48eb4537dc94b0ce54e40595e53c2f9aa
                                                  • Opcode Fuzzy Hash: dd1534cdfca61dad581922c286f6b4958bce6ff540665922f7c541d32ce2bea1
                                                  • Instruction Fuzzy Hash: E151CEB1D00319DFDB15CFA9D980ADEBBB1FF88314F25812AE819AB251D7749885CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1112 a2de0c-a2fd9e 1114 a2fda0-a2fda6 1112->1114 1115 a2fda9-a2fdb0 1112->1115 1114->1115 1116 a2fdb2-a2fdb8 1115->1116 1117 a2fdbb-a2fe5a CreateWindowExW 1115->1117 1116->1117 1119 a2fe63-a2fe9b 1117->1119 1120 a2fe5c-a2fe62 1117->1120 1124 a2fea8 1119->1124 1125 a2fe9d-a2fea0 1119->1125 1120->1119 1126 a2fea9 1124->1126 1125->1124 1126->1126
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00A2FE4A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: d790c2a509d09be9303893df3c62914ae96dfb53c0553aaedf50cd37e46d27b4
                                                  • Instruction ID: f2c49ec8e28f6108e80d3669dc74827f34044198429cfa1ff9cb56290a2fbe39
                                                  • Opcode Fuzzy Hash: d790c2a509d09be9303893df3c62914ae96dfb53c0553aaedf50cd37e46d27b4
                                                  • Instruction Fuzzy Hash: 6451D0B1D00318DFDB15CF99D984ADEBBB5BF88314F25822AE819AB210D7749845CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1158 a2536c-a25439 CreateActCtxA 1160 a25442-a2549c 1158->1160 1161 a2543b-a25441 1158->1161 1168 a254ab-a254af 1160->1168 1169 a2549e-a254a1 1160->1169 1161->1160 1170 a254c0 1168->1170 1171 a254b1-a254bd 1168->1171 1169->1168 1172 a254c1 1170->1172 1171->1170 1172->1172
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 00A25429
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 947ce52a3d1509c3a3b4a13e9623271ef7eaaa4cf00ba7668c53ae30a1b06d73
                                                  • Instruction ID: b3b4bd3f82f585507c69a359c5b487f74cbb1817e25c9674c62ea254fddfa526
                                                  • Opcode Fuzzy Hash: 947ce52a3d1509c3a3b4a13e9623271ef7eaaa4cf00ba7668c53ae30a1b06d73
                                                  • Instruction Fuzzy Hash: 9A411370C04619CFDB24DFA9C884BDEBBB2BF49308F258169D408BB251DB756986CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1141 a23de8-a25439 CreateActCtxA 1144 a25442-a2549c 1141->1144 1145 a2543b-a25441 1141->1145 1152 a254ab-a254af 1144->1152 1153 a2549e-a254a1 1144->1153 1145->1144 1154 a254c0 1152->1154 1155 a254b1-a254bd 1152->1155 1153->1152 1156 a254c1 1154->1156 1155->1154 1156->1156
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 00A25429
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 2f053a3f6925d30c62824648b1eec6e1a414ced1931f5376a679d9eedf4b285f
                                                  • Instruction ID: bc0a38a2f2702bca7663d40012947fa6f357a6f7fd1149febf93207b0c5584f4
                                                  • Opcode Fuzzy Hash: 2f053a3f6925d30c62824648b1eec6e1a414ced1931f5376a679d9eedf4b285f
                                                  • Instruction Fuzzy Hash: E0410470C0461DCBDB24DFA9C8447DEBBB6BF49308F248169D509BB250DB756946CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073671B8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 581d57b56ae8908bf0698dfd888cb52f805d41b59707075c2afa8d181851fd4b
                                                  • Instruction ID: 5e077d6554f0a14c11bfb14d56a33f161d5b94e76b91c58fc990d5b0b1af78dd
                                                  • Opcode Fuzzy Hash: 581d57b56ae8908bf0698dfd888cb52f805d41b59707075c2afa8d181851fd4b
                                                  • Instruction Fuzzy Hash: E2215AB19003099FCB00CFA9C985BDEBBF5FF48314F14842AE919A7340DB789945CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073671B8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 232422529c2cc6612af0448ab8cf6bd2230e2a6894ebd10980b362dbd2b24f1e
                                                  • Instruction ID: 9c954bef149a64507fe0a800b2cfdb7cb77abdf5757978c00c8b2b77767018a8
                                                  • Opcode Fuzzy Hash: 232422529c2cc6612af0448ab8cf6bd2230e2a6894ebd10980b362dbd2b24f1e
                                                  • Instruction Fuzzy Hash: BA2127B19003199FCB00CFA9C985BEEBBF5FF48314F54842AE919A7240DB789945CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetThreadContext.KERNELBASE(?,00000000), ref: 0736700E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: ContextThread
                                                  • String ID:
                                                  • API String ID: 1591575202-0
                                                  • Opcode ID: aea2068855349ecbd95a80303b088403b79050b247a5bd8173e194467b9d8aab
                                                  • Instruction ID: e0956af469d0537fc47c93f1943ae7c65c853d5584ca98c188fbed9aeea7be21
                                                  • Opcode Fuzzy Hash: aea2068855349ecbd95a80303b088403b79050b247a5bd8173e194467b9d8aab
                                                  • Instruction Fuzzy Hash: 8D214CB1D003099FDB10DFA9C5857EEBBF4EF48358F248429D559AB240CB789946CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00A2B8BE,?,?,?,?,?), ref: 00A2B97F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: f91084c40100ff566f89f9a2a2af09323db66aa3ef9d1e4ae7555d66494ca285
                                                  • Instruction ID: e3150609c50f118b044e71b3fa959ac9f77256bed306109bdd2075c3b59a0758
                                                  • Opcode Fuzzy Hash: f91084c40100ff566f89f9a2a2af09323db66aa3ef9d1e4ae7555d66494ca285
                                                  • Instruction Fuzzy Hash: 7A21D4B59002199FDB10CF99D584AEEBBF8FB48314F14842AE914A7310D774A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07367298
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 5b0db011b9fb56a4b7c6917c846859d0fcf5c3b9820953431c8f4bbddcb8f441
                                                  • Instruction ID: 6c1e50d12b0d45cb52c8bfd229769620dc9d6584923a39c6173e0c69658d7a12
                                                  • Opcode Fuzzy Hash: 5b0db011b9fb56a4b7c6917c846859d0fcf5c3b9820953431c8f4bbddcb8f441
                                                  • Instruction Fuzzy Hash: 682136B1C002199FCB00CFA9D8846EEBBB5FF48324F55842AE519A7240CB789905CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetThreadContext.KERNELBASE(?,00000000), ref: 0736700E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: ContextThread
                                                  • String ID:
                                                  • API String ID: 1591575202-0
                                                  • Opcode ID: 1a5e88ac27976d0e4144894c542e4bee9ce6098442a4bbb15cac6bccc1a3a3c6
                                                  • Instruction ID: a046e7619b76807adb4fafb03b750df7b0c8971397e2ef6f1319adddaec043dd
                                                  • Opcode Fuzzy Hash: 1a5e88ac27976d0e4144894c542e4bee9ce6098442a4bbb15cac6bccc1a3a3c6
                                                  • Instruction Fuzzy Hash: 592149B1D003099FDB10DFAAC9857EEBBF4EF48218F148429D519A7240CB78A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07367298
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 026beaf18ddd10cf160f15d9efd7a0728faade8ef917c0362f50a279c4d7e340
                                                  • Instruction ID: 4a50b943faf5dd019f7f9c10d171c669681a80206247114b40badddfc3aa42c7
                                                  • Opcode Fuzzy Hash: 026beaf18ddd10cf160f15d9efd7a0728faade8ef917c0362f50a279c4d7e340
                                                  • Instruction Fuzzy Hash: 4F2159B1C003099FCB00CFAAC884BEEBBF5FF48314F548429E519A7240CB789905CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00A2B8BE,?,?,?,?,?), ref: 00A2B97F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 802624f110bf1e10f9454888e5d5f7adc77da1bd015cc40a5382adf9e1b82802
                                                  • Instruction ID: ce2954ff1caa8512749ebde8ba487330a918cfdf2212325f5e046c70390fed20
                                                  • Opcode Fuzzy Hash: 802624f110bf1e10f9454888e5d5f7adc77da1bd015cc40a5382adf9e1b82802
                                                  • Instruction Fuzzy Hash: 7F2112B5D00208DFCB00CFA9E584ADEBBF5FB48324F14801AE914A7350C778A984CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073670D6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 1111e44dc8b190535ca6dd2261fd11cfe0c9180862be3fc397b929b3a7a2d876
                                                  • Instruction ID: fd404f7b5c0ec3953b2e1457d1ac2042ef2e87f9b9bbc144647ff2814cbd6ded
                                                  • Opcode Fuzzy Hash: 1111e44dc8b190535ca6dd2261fd11cfe0c9180862be3fc397b929b3a7a2d876
                                                  • Instruction Fuzzy Hash: 061126719006099FCB10DFA9D8447EFBBF5FB88324F248819E519AB250CB799945CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A29991,00000800,00000000,00000000), ref: 00A29BA2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: f46b57b2e198cc04a521cfaa6cf6ceae09862678b659b4da08844cc855b15913
                                                  • Instruction ID: dca21be040cdb40ddb791ebdadbf6f29aee3fc54df97723d6894257b32010c74
                                                  • Opcode Fuzzy Hash: f46b57b2e198cc04a521cfaa6cf6ceae09862678b659b4da08844cc855b15913
                                                  • Instruction Fuzzy Hash: 261133B29002088FCB10CF9AE444ADEBBF4EB88724F14842AE915A7200C774A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073670D6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: e24d33f7b4502270d412a5bbc35f744491378ab4772448fa363e74e102084e07
                                                  • Instruction ID: 34d9e09659c5b6444d2ae3983bb4a9f13c166e52d537e45f9c00823df37ae1b5
                                                  • Opcode Fuzzy Hash: e24d33f7b4502270d412a5bbc35f744491378ab4772448fa363e74e102084e07
                                                  • Instruction Fuzzy Hash: F21137719002099FCB10DFA9D844BEFBBF5EF48324F248819E519A7250CB75A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 90cdf730b97e492e0a56a0f8cf8b0e229808fd096a817a845ab5f8dabbc8c5f2
                                                  • Instruction ID: 4728d52774fa45a531143a2154337b831095bc3eafa01a16edb7aac75faca57c
                                                  • Opcode Fuzzy Hash: 90cdf730b97e492e0a56a0f8cf8b0e229808fd096a817a845ab5f8dabbc8c5f2
                                                  • Instruction Fuzzy Hash: 95116AB1D042498FDB10CFA9D4857EEFBF4EB88224F258419D519BB640CB789945CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A29991,00000800,00000000,00000000), ref: 00A29BA2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 182ca23dfc1cca0076423597cb3565644dfc6ea7d42f2508563c976202862224
                                                  • Instruction ID: 11a6bc7fc025efb1b2565fbace154d42daff02b259e2686181a2118fdedc1746
                                                  • Opcode Fuzzy Hash: 182ca23dfc1cca0076423597cb3565644dfc6ea7d42f2508563c976202862224
                                                  • Instruction Fuzzy Hash: 1A1126B6D002098FCB14CF99E544BDEFBF5BB88324F14842ED959A7200C775A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 616f6f282cf91bc87ee6ad28bb7a152916f55dcf7e353083739f5062e8cf0546
                                                  • Instruction ID: 4420a0313679a1ba90423fab6bb438150a9ff8b4ae5fc9d841c9d10bf2ec6a68
                                                  • Opcode Fuzzy Hash: 616f6f282cf91bc87ee6ad28bb7a152916f55dcf7e353083739f5062e8cf0546
                                                  • Instruction Fuzzy Hash: 22116AB1D003498FCB10CFAAD4457EFFBF4EB88224F248419D519B7240CB78A945CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00A29916
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: bc1c292cb8e82505bfdb261e5463de54c178d350dbbb91e05f3734b930c02f1c
                                                  • Instruction ID: a1c1172e341158ebd315e5f79ed71a388003744088d1a01f565274fabebdb7a7
                                                  • Opcode Fuzzy Hash: bc1c292cb8e82505bfdb261e5463de54c178d350dbbb91e05f3734b930c02f1c
                                                  • Instruction Fuzzy Hash: C3110FB5D006498FCB10CF9AD444ADEFBF4EB89724F14842AD429B7200C778A545CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,?,?,?), ref: 0736B795
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 668c1bdc5ce9bb1b4858922d1d5261fbce25c13b6a1ee36ddf231cdd29a7a01d
                                                  • Instruction ID: 4691b502b6551c422e2c3b1b7e1650cebbdf944361bb66111eebbbbf29d83c39
                                                  • Opcode Fuzzy Hash: 668c1bdc5ce9bb1b4858922d1d5261fbce25c13b6a1ee36ddf231cdd29a7a01d
                                                  • Instruction Fuzzy Hash: EB1125B58003499FDB10CF99D988BDEBBF8EB48324F248419E418A7200C775A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,?,?,?), ref: 0736B795
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: a2b2cf54740ee94698f82dea76f33469470941e54cbf9246d23c179959e18b87
                                                  • Instruction ID: b00aa55d02dc5b68a26e95c11ed5179f63c175c8438843fe657bb41ffbcec89e
                                                  • Opcode Fuzzy Hash: a2b2cf54740ee94698f82dea76f33469470941e54cbf9246d23c179959e18b87
                                                  • Instruction Fuzzy Hash: 8911D0B58007499FDB10CF99D989BDEFBF8FB48324F24881AE519A7600C775A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729101370.00000000008CD000.00000040.00000001.sdmp, Offset: 008CD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8cd000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 12b96742c21fdd77e8440f62e52cb219114b5e02db4720d632f1403d068108f7
                                                  • Instruction ID: 63231d8fa8e4ca25e8f61a588073e3289037cb8ce460a66653b5e738eecae5ae
                                                  • Opcode Fuzzy Hash: 12b96742c21fdd77e8440f62e52cb219114b5e02db4720d632f1403d068108f7
                                                  • Instruction Fuzzy Hash: 3021BD71604B449FDB14EF18D9C0F16BBA5FB84328F24C9BDD90A8B246C73AD846CA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729101370.00000000008CD000.00000040.00000001.sdmp, Offset: 008CD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8cd000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1614896f957b53b601953458acf92b7a00ec913ef9ff07cfbfe1b6a85e23eac0
                                                  • Instruction ID: 826f5a53b388aacef3147553cd857410c8ff6a125aedf6972c3381f5b2eefe41
                                                  • Opcode Fuzzy Hash: 1614896f957b53b601953458acf92b7a00ec913ef9ff07cfbfe1b6a85e23eac0
                                                  • Instruction Fuzzy Hash: 98219DB1604344AFDB05EF54D9C0F26BBB5FB84318F24C9BDE9498B246C736E846CA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729101370.00000000008CD000.00000040.00000001.sdmp, Offset: 008CD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8cd000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cc16c29598044954f4980a0c83147da8b9812f1b5fa16f843667af26126a180b
                                                  • Instruction ID: 76f58db531f8c95c8a6330c36bb22225bf0400e04083748c7c095699b8961684
                                                  • Opcode Fuzzy Hash: cc16c29598044954f4980a0c83147da8b9812f1b5fa16f843667af26126a180b
                                                  • Instruction Fuzzy Hash: 01118E75504280DFDB11DF10D6C4B15BB71FB84314F28C6ADD8498B656C33AE85ACB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729101370.00000000008CD000.00000040.00000001.sdmp, Offset: 008CD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8cd000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cc16c29598044954f4980a0c83147da8b9812f1b5fa16f843667af26126a180b
                                                  • Instruction ID: cef381e9ef941aecdd5addce0783aa0df114dd88c5e8c1970e760c8816fe8c5c
                                                  • Opcode Fuzzy Hash: cc16c29598044954f4980a0c83147da8b9812f1b5fa16f843667af26126a180b
                                                  • Instruction Fuzzy Hash: 4811BB75504780DFCB11DF14D6C4B16BBB1FB84324F28C6AED8498B656C33AD84ACBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.728391842.0000000000082000.00000002.00020000.sdmp, Offset: 00080000, based on PE: true
                                                  • Associated: 00000000.00000002.728362988.0000000000080000.00000002.00020000.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4b29b6829ca543415d72bd40f6545b68b94dffe41ceb85d6655b340b5428fbd8
                                                  • Instruction ID: 67b17f64583736fb611819518fdc47bf0168c4915997ce76f141457fbcbb9430
                                                  • Opcode Fuzzy Hash: 4b29b6829ca543415d72bd40f6545b68b94dffe41ceb85d6655b340b5428fbd8
                                                  • Instruction Fuzzy Hash: BA73F56240E7C25FCB139BB85CB52D17FB1AE6721471E49CBC4C0CF0A3E5186A6AD726
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: UUUU
                                                  • API String ID: 0-1798160573
                                                  • Opcode ID: 3a18fe050722960fb23730dc0a448f7f3c1301e5e11de2db45fe108d7ef26c2e
                                                  • Instruction ID: 2507bbd0b86b8f3ac9bfbebb2417902065f9c87d04b9bec8cda121d4b92940ac
                                                  • Opcode Fuzzy Hash: 3a18fe050722960fb23730dc0a448f7f3c1301e5e11de2db45fe108d7ef26c2e
                                                  • Instruction Fuzzy Hash: B9515F74E156288FDBA4CFACC98078DB7F2AF48314F2485A9D50DEB215DB349A89CF05
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3deefe3158e7f67afa5f08ca3e070aab2355f394bfb83d331bf4141c8b414889
                                                  • Instruction ID: a2b859e1f2aedf22530b1bda2d71523ca6abdfc03edb7e51b1f49928a78a742e
                                                  • Opcode Fuzzy Hash: 3deefe3158e7f67afa5f08ca3e070aab2355f394bfb83d331bf4141c8b414889
                                                  • Instruction Fuzzy Hash: 081270F1D11B46CAE710CFB5EDAC1893BA1B7453AAB914308D2612BAF1D7B8154BCF84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 377b31ff7f309b8e61217037fb1b4261d79303052dcbaeee783515bac2c3eedc
                                                  • Instruction ID: a775c9a401e935692b901d875535e014e8ce4b08527ebbb1edf817204d908b78
                                                  • Opcode Fuzzy Hash: 377b31ff7f309b8e61217037fb1b4261d79303052dcbaeee783515bac2c3eedc
                                                  • Instruction Fuzzy Hash: 05A16C32E00229CFCF05DFA9D9449DEB7B2FF85300B15857AE905BB262EB71A945CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.729229168.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_a20000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5d538f1290a427ec164744a3db4dc424d9dc56170f87dbd36f1e1b66ca2f9330
                                                  • Instruction ID: bdb048ec4da4349cd63a3743ecaab374de450aca681357c81cd9f80b4c855789
                                                  • Opcode Fuzzy Hash: 5d538f1290a427ec164744a3db4dc424d9dc56170f87dbd36f1e1b66ca2f9330
                                                  • Instruction Fuzzy Hash: CFC1E7B1D11B46CAD710CFB5ECAC1897BB1BB8536AF514309D2612BAE1E7B8144BCF84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ecd47cb4aa75a5b0aa08f9779b458d5b686e4d013de397fb38d069b1f8bd2a1c
                                                  • Instruction ID: ec975dbed131cdee8fc722eb02aa8f1f111779cc632f42240faf8405d55650bb
                                                  • Opcode Fuzzy Hash: ecd47cb4aa75a5b0aa08f9779b458d5b686e4d013de397fb38d069b1f8bd2a1c
                                                  • Instruction Fuzzy Hash: EA4162B1E056588BEB1CCF6B8C4078AFAF7AFC5200F14C1FAC90CAA215DB3449868F15
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.735070644.0000000007360000.00000040.00000001.sdmp, Offset: 07360000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7360000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1d7bc5397aba14c0a8344e2c33ba2a7761f356b858c2ca378214332e5abd70a5
                                                  • Instruction ID: 3a3b53e856c8c2a121b09c1e2072903a47fc12a51aa48ab328e1391269d203c6
                                                  • Opcode Fuzzy Hash: 1d7bc5397aba14c0a8344e2c33ba2a7761f356b858c2ca378214332e5abd70a5
                                                  • Instruction Fuzzy Hash: F34132B1E016588BEB5CCF6B8C4478AFAF7AFC9204F14C1BA850CA6218EB7049858F15
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:14.7%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:183
                                                  Total number of Limit Nodes:8

                                                  Graph

                                                  execution_graph 16884 4f8a0f8 16885 4f8a109 16884->16885 16888 4f8a173 16885->16888 16889 4f89788 16885->16889 16890 4f89793 16889->16890 16891 4f8a16c 16890->16891 16893 4f8b898 16890->16893 16899 4f8a504 16893->16899 16896 4f8b8bf 16896->16891 16897 4f8b8e8 CreateIconFromResourceEx 16898 4f8b966 16897->16898 16898->16891 16900 4f8b8e8 CreateIconFromResourceEx 16899->16900 16901 4f8b8b2 16900->16901 16901->16896 16901->16897 16927 1086758 16929 1086766 16927->16929 16930 1086344 16927->16930 16931 108634f 16930->16931 16934 1086394 16931->16934 16933 108688d 16933->16929 16935 108639f 16934->16935 16938 10863c4 16935->16938 16937 1086962 16937->16933 16939 10863cf 16938->16939 16942 10863f4 16939->16942 16941 1086a62 16941->16937 16944 10863ff 16942->16944 16943 10871bc 16943->16941 16944->16943 16947 108b408 16944->16947 16953 108b406 16944->16953 16948 108b429 16947->16948 16949 108b44d 16948->16949 16959 108b5b8 16948->16959 16963 108b586 16948->16963 16968 108b5a9 16948->16968 16949->16943 16954 108b429 16953->16954 16955 108b44d 16954->16955 16956 108b5b8 8 API calls 16954->16956 16957 108b5a9 8 API calls 16954->16957 16958 108b586 8 API calls 16954->16958 16955->16943 16956->16955 16957->16955 16958->16955 16960 108b5c5 16959->16960 16961 108b5ff 16960->16961 16972 108a0ec 16960->16972 16961->16949 16964 108b58b 16963->16964 16965 108b5d3 16963->16965 16964->16949 16966 108b5ff 16965->16966 16967 108a0ec 8 API calls 16965->16967 16966->16949 16967->16966 16969 108b5c5 16968->16969 16970 108b5ff 16969->16970 16971 108a0ec 8 API calls 16969->16971 16970->16949 16971->16970 16973 108a0f7 16972->16973 16975 108c2f8 16973->16975 16976 108b904 16973->16976 16975->16975 16977 108b90f 16976->16977 16978 108c367 16977->16978 16979 10863f4 8 API calls 16977->16979 16986 108c3e0 16978->16986 16992 108c3d1 16978->16992 16979->16978 16980 108c375 16982 108e0d8 LoadLibraryExW GetModuleHandleW CreateWindowExW CreateWindowExW 16980->16982 16983 108e0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW CreateWindowExW 16980->16983 16981 108c3a0 16981->16975 16982->16981 16983->16981 16987 108c40e 16986->16987 16990 108c4df 16987->16990 16998 4f82750 16987->16998 16988 108c486 16989 108c4da KiUserCallbackDispatcher 16988->16989 16989->16990 16993 108c40e 16992->16993 16996 108c4df 16993->16996 16997 4f82750 6 API calls 16993->16997 16994 108c486 16995 108c4da KiUserCallbackDispatcher 16994->16995 16995->16996 16997->16994 16999 4f82760 16998->16999 17000 4f8279d 16999->17000 17001 4f85d48 6 API calls 16999->17001 17000->16988 17001->17000 17023 4f8c4d8 17024 4f82750 6 API calls 17023->17024 17025 4f8c4e8 17024->17025 17029 108fe02 17025->17029 17032 108fe10 17025->17032 17026 4f8c4fa 17035 108da3c 17029->17035 17033 108fe28 17032->17033 17034 108da3c SetWindowLongW 17032->17034 17033->17026 17034->17033 17036 108fe40 SetWindowLongW 17035->17036 17037 108fe28 17036->17037 17037->17026 17038 4f825d8 17039 4f825e8 17038->17039 17042 4f88898 17039->17042 17040 4f82611 17043 4f888cd 17042->17043 17046 4f83660 17043->17046 17045 4f88922 17045->17040 17051 4f8368c 17046->17051 17047 4f83a87 17047->17045 17048 4f82750 6 API calls 17049 4f83a64 17048->17049 17058 4f832d8 17049->17058 17052 4f82750 6 API calls 17051->17052 17056 4f838bc 17051->17056 17057 4f837e5 17051->17057 17053 4f837af 17052->17053 17054 4f82750 6 API calls 17053->17054 17054->17057 17055 4f82750 6 API calls 17055->17056 17056->17047 17056->17048 17057->17055 17059 4f8e6e0 PostMessageW 17058->17059 17060 4f8e74c 17059->17060 17060->17047 16902 4f8353c 16904 4f83547 16902->16904 16906 4f8357c 16904->16906 16905 4f84aed 16910 4f83587 16906->16910 16907 4f85383 16911 4f8539b 16907->16911 16912 4f84f1c 16907->16912 16909 4f84f1c OleInitialize 16909->16907 16910->16907 16910->16909 16910->16911 16911->16905 16913 4f84f27 16912->16913 16915 4f8f091 16913->16915 16916 4f8dc44 16913->16916 16915->16911 16918 4f8dc4f 16916->16918 16917 4f8f3ab 16917->16915 16918->16917 16920 4f8dc60 16918->16920 16921 4f8f3e0 OleInitialize 16920->16921 16922 4f8f444 16921->16922 16922->16917 16923 4f82470 16924 4f824b2 16923->16924 16926 4f824b9 16923->16926 16925 4f8250a CallWindowProcW 16924->16925 16924->16926 16925->16926 17002 4f817e0 17005 4f8182c 17002->17005 17003 4f81a99 17005->17003 17006 4f81540 17005->17006 17007 4f8c3d8 SendMessageW 17006->17007 17008 4f8c444 17007->17008 17008->17005 17009 108b6d0 17010 108b736 17009->17010 17014 108bc88 17010->17014 17017 108bc98 17010->17017 17011 108b7e5 17020 108a14c 17014->17020 17018 108bcc6 17017->17018 17019 108a14c DuplicateHandle 17017->17019 17018->17011 17019->17018 17021 108bd00 DuplicateHandle 17020->17021 17022 108bcc6 17021->17022 17022->17011 17070 4f84180 17072 4f841a7 17070->17072 17071 4f84284 17072->17071 17074 4f83474 17072->17074 17075 4f84600 CreateActCtxA 17074->17075 17077 4f846c3 17075->17077 17078 10892f0 17079 10892ff 17078->17079 17082 10893e8 17078->17082 17090 10893d9 17078->17090 17083 10893fb 17082->17083 17084 1089413 17083->17084 17098 1089660 17083->17098 17102 1089670 17083->17102 17084->17079 17085 108940b 17085->17084 17086 1089610 GetModuleHandleW 17085->17086 17087 108963d 17086->17087 17087->17079 17091 10893fb 17090->17091 17092 1089413 17091->17092 17096 1089660 LoadLibraryExW 17091->17096 17097 1089670 LoadLibraryExW 17091->17097 17092->17079 17093 108940b 17093->17092 17094 1089610 GetModuleHandleW 17093->17094 17095 108963d 17094->17095 17095->17079 17096->17093 17097->17093 17099 1089684 17098->17099 17100 10896a9 17099->17100 17106 1088768 17099->17106 17100->17085 17103 1089684 17102->17103 17104 1088768 LoadLibraryExW 17103->17104 17105 10896a9 17103->17105 17104->17105 17105->17085 17107 1089850 LoadLibraryExW 17106->17107 17109 10898c9 17107->17109 17109->17100 17061 4f850d4 17062 4f8d240 SendMessageW 17061->17062 17063 4f8d2ac 17062->17063 17064 4f8e3d7 17065 4f8e3fc 17064->17065 17069 4f8e3dd 17064->17069 17066 4f82750 6 API calls 17065->17066 17067 4f8e40e 17066->17067 17068 4f832d8 PostMessageW 17067->17068 17068->17069

                                                  Executed Functions

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 296 108faa0-108fb60 297 108fb62-108fbc3 296->297 298 108fbc4-108fbd6 296->298 297->298 299 108fbd8 298->299 300 108fbe0-108fc5e 298->300 301 108fbdd-108fbde 299->301 302 108fbd8 call 108da04 299->302 303 108fc69-108fc70 300->303 304 108fc60-108fc66 300->304 302->301 305 108fc7b-108fd1a CreateWindowExW 303->305 306 108fc72-108fc78 303->306 304->303 308 108fd1c-108fd22 305->308 309 108fd23-108fd5b 305->309 306->305 308->309 313 108fd68 309->313 314 108fd5d-108fd60 309->314 315 108fd69 313->315 314->313 315->315
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 89b5364e621c9c5086acb361f8caf99e92205059ed5c30a11167dd4cffa31f48
                                                  • Instruction ID: 28e06aa9e4aa6f4257788b41ced7c09ef811d438272a53068c8cb23ccf6d67bb
                                                  • Opcode Fuzzy Hash: 89b5364e621c9c5086acb361f8caf99e92205059ed5c30a11167dd4cffa31f48
                                                  • Instruction Fuzzy Hash: 3C919CB1C193899FDB02DFA4C8909CDBFB1EF0A340F2981AAE444AB252D7395846CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 316 10893e8-10893f0 317 10893fb-10893fd 316->317 318 10893f6 call 1088704 316->318 319 10893ff 317->319 320 1089413-1089417 317->320 318->317 369 1089405 call 1089660 319->369 370 1089405 call 1089670 319->370 321 1089419-1089423 320->321 322 108942b-108946c 320->322 321->322 327 1089479-1089487 322->327 328 108946e-1089476 322->328 323 108940b-108940d 323->320 324 1089548-1089608 323->324 364 108960a-108960d 324->364 365 1089610-108963b GetModuleHandleW 324->365 329 1089489-108948e 327->329 330 10894ab-10894ad 327->330 328->327 332 1089499 329->332 333 1089490-1089497 call 1088710 329->333 334 10894b0-10894b7 330->334 335 108949b-10894a9 332->335 333->335 337 10894b9-10894c1 334->337 338 10894c4-10894cb 334->338 335->334 337->338 341 10894d8-10894e1 call 1088720 338->341 342 10894cd-10894d5 338->342 346 10894ee-10894f3 341->346 347 10894e3-10894eb 341->347 342->341 349 1089511-1089515 346->349 350 10894f5-10894fc 346->350 347->346 371 1089518 call 1089958 349->371 372 1089518 call 1089968 349->372 350->349 351 10894fe-108950e call 1088730 call 1088740 350->351 351->349 354 108951b-108951e 357 1089520-108953e 354->357 358 1089541-1089547 354->358 357->358 364->365 366 108963d-1089643 365->366 367 1089644-1089658 365->367 366->367 369->323 370->323 371->354 372->354
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0108962E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 6770a064e53e582992b8039e97e19b07eeddec6c4847143065b310c225b9691d
                                                  • Instruction ID: 135d2ce555ffaebd553c0a37a17c8dfa05837e55953b421d0894546724928af8
                                                  • Opcode Fuzzy Hash: 6770a064e53e582992b8039e97e19b07eeddec6c4847143065b310c225b9691d
                                                  • Instruction Fuzzy Hash: 35715770A04B058FD764EF2AC4417AABBF1FF88208F108A6ED586D7A50DB34E845CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 373 108da04-108fc5e 375 108fc69-108fc70 373->375 376 108fc60-108fc66 373->376 377 108fc7b-108fd1a CreateWindowExW 375->377 378 108fc72-108fc78 375->378 376->375 380 108fd1c-108fd22 377->380 381 108fd23-108fd5b 377->381 378->377 380->381 385 108fd68 381->385 386 108fd5d-108fd60 381->386 387 108fd69 385->387 386->385 387->387
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0108FD0A
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 20f12a1e18ce468d9d83220a4cd50dfc4760c3601c9c6d95205bf32e9574e852
                                                  • Instruction ID: b21b9f3f24f45bccbaaf469f8e065cb41310d0e0045984423d59ec66f572ba88
                                                  • Opcode Fuzzy Hash: 20f12a1e18ce468d9d83220a4cd50dfc4760c3601c9c6d95205bf32e9574e852
                                                  • Instruction Fuzzy Hash: 1E51E0B1D043099FDB14DFA9C980ADEBBB5FF48310F24812AE919AB210D774A885CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 388 4f83474-4f846c1 CreateActCtxA 391 4f846ca-4f84724 388->391 392 4f846c3-4f846c9 388->392 399 4f84733-4f84737 391->399 400 4f84726-4f84729 391->400 392->391 401 4f84748 399->401 402 4f84739-4f84745 399->402 400->399 402->401
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 04F846B1
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.942501938.0000000004F80000.00000040.00000001.sdmp, Offset: 04F80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_4f80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 9977e927909a0895826527455f163e87ad56dd7d0cc12138fa9beb5f5d12e5be
                                                  • Instruction ID: 8be6a4aa6200fc73a8d04d1b3f8e28430090226920657c04e0fe9aa9a2e98089
                                                  • Opcode Fuzzy Hash: 9977e927909a0895826527455f163e87ad56dd7d0cc12138fa9beb5f5d12e5be
                                                  • Instruction Fuzzy Hash: 8C41F371D0461DCBDB24DFA9C844BCEBBF1BF49308F258169D808AB250EB756946CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 404 4f82470-4f824ac 405 4f8255c-4f8257c 404->405 406 4f824b2-4f824b7 404->406 412 4f8257f-4f8258c 405->412 407 4f824b9-4f824f0 406->407 408 4f8250a-4f82542 CallWindowProcW 406->408 414 4f824f9-4f82508 407->414 415 4f824f2-4f824f8 407->415 409 4f8254b-4f8255a 408->409 410 4f82544-4f8254a 408->410 409->412 410->409 414->412 415->414
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 04F82531
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.942501938.0000000004F80000.00000040.00000001.sdmp, Offset: 04F80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_4f80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID:
                                                  • API String ID: 2714655100-0
                                                  • Opcode ID: 9c426b361f1e9d102a6223bd301a875497cf55ef01bfedde414349f5fda87920
                                                  • Instruction ID: 8277cd8bbfb089e0f6e48e9bae16a41a3b6c85fb8bc24ad9893d7ec1a34c736a
                                                  • Opcode Fuzzy Hash: 9c426b361f1e9d102a6223bd301a875497cf55ef01bfedde414349f5fda87920
                                                  • Instruction Fuzzy Hash: 624129B5A002058FDB14DF99C488AABBBF5FB88314F25849DD519AB361D734E942CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 418 4f8b898-4f8b8bd call 4f8a504 421 4f8b8bf-4f8b8cf call 4f8b358 418->421 422 4f8b8d2-4f8b964 CreateIconFromResourceEx 418->422 427 4f8b96d-4f8b98a 422->427 428 4f8b966-4f8b96c 422->428 428->427
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.942501938.0000000004F80000.00000040.00000001.sdmp, Offset: 04F80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_4f80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: CreateFromIconResource
                                                  • String ID:
                                                  • API String ID: 3668623891-0
                                                  • Opcode ID: dd86a6445a3202fb1ea203d52c1dbdc23abe93ba741e14ffac019d97884d1c5a
                                                  • Instruction ID: a6441a59b5a00b7921041b05c545d33885a017012949730ea5b67ac21f14be3d
                                                  • Opcode Fuzzy Hash: dd86a6445a3202fb1ea203d52c1dbdc23abe93ba741e14ffac019d97884d1c5a
                                                  • Instruction Fuzzy Hash: EB3169719042499FDB01DFA9D800ADEBFF8EF09310F18805AF954AB221C739A855DBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 431 108a14c-108bd94 DuplicateHandle 433 108bd9d-108bdba 431->433 434 108bd96-108bd9c 431->434 434->433
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0108BCC6,?,?,?,?,?), ref: 0108BD87
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 2952260c50d3cc83cbc86c09c629c171a99a590c435fb518895faf05dc088abe
                                                  • Instruction ID: 3e780d4d3232e55fc698012fecf62a46c64cbf4c18d4c4501a1ea2a82d797098
                                                  • Opcode Fuzzy Hash: 2952260c50d3cc83cbc86c09c629c171a99a590c435fb518895faf05dc088abe
                                                  • Instruction Fuzzy Hash: FD21E3B5904308AFDB10DF99D984ADEBBF4EB48324F14842AE954A7310D778A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 437 108bcf9-108bd94 DuplicateHandle 438 108bd9d-108bdba 437->438 439 108bd96-108bd9c 437->439 439->438
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0108BCC6,?,?,?,?,?), ref: 0108BD87
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 6bf7016781c3bb7d24d4953d4dd486c704fc9a34eb7f80b784608190a7085486
                                                  • Instruction ID: 947e011dda21bc177640c0d93a2dc1ab8e53e87284b28b133ae4de61a2a1c129
                                                  • Opcode Fuzzy Hash: 6bf7016781c3bb7d24d4953d4dd486c704fc9a34eb7f80b784608190a7085486
                                                  • Instruction Fuzzy Hash: 6C21F5B5D00208AFDB10DFA9D584ADEBFF4FB48320F14841AE958A7310D778A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 449 4f8a504-4f8b964 CreateIconFromResourceEx 451 4f8b96d-4f8b98a 449->451 452 4f8b966-4f8b96c 449->452 452->451
                                                  APIs
                                                  • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,04F8B8B2,?,?,?,?,?), ref: 04F8B957
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.942501938.0000000004F80000.00000040.00000001.sdmp, Offset: 04F80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_4f80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: CreateFromIconResource
                                                  • String ID:
                                                  • API String ID: 3668623891-0
                                                  • Opcode ID: 4394fa72ca0d6a9c6c8624ebf5892ba3448948dd98965733f5bc683e4197dead
                                                  • Instruction ID: efef717f17025cc868bb73d6def75f0eb2fb6f1fb64ea04ff0c741111be2b104
                                                  • Opcode Fuzzy Hash: 4394fa72ca0d6a9c6c8624ebf5892ba3448948dd98965733f5bc683e4197dead
                                                  • Instruction Fuzzy Hash: FF1167B29002499FDB10DF9AD944BDEBFF8EB48320F14841AE914B7210C738A954DFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 442 1089849-1089890 443 1089898-10898c7 LoadLibraryExW 442->443 444 1089892-1089895 442->444 445 10898c9-10898cf 443->445 446 10898d0-10898ed 443->446 444->443 445->446
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,010896A9,00000800,00000000,00000000), ref: 010898BA
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 5ac716cb0affc5e69243927e69a212531e475097560519d4062aad3167f1de1a
                                                  • Instruction ID: 30d67d1058a416faaa9f3cd911607e758f3c2cf952100ef7bd7e8cc9d83ef954
                                                  • Opcode Fuzzy Hash: 5ac716cb0affc5e69243927e69a212531e475097560519d4062aad3167f1de1a
                                                  • Instruction Fuzzy Hash: 9C1103B6D00209CFDB10DF9AD544ADEBBF4EB88324F14842AD555A7600C778A545CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 455 1088768-1089890 457 1089898-10898c7 LoadLibraryExW 455->457 458 1089892-1089895 455->458 459 10898c9-10898cf 457->459 460 10898d0-10898ed 457->460 458->457 459->460
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,010896A9,00000800,00000000,00000000), ref: 010898BA
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 286e2b3ca924db6c403494f7d921411b713a2b0e608a59469b4b8899c4551d80
                                                  • Instruction ID: b8e6887b388380274b553ed4fe6524bae82e61824f231c312a5d57829a6f8cb2
                                                  • Opcode Fuzzy Hash: 286e2b3ca924db6c403494f7d921411b713a2b0e608a59469b4b8899c4551d80
                                                  • Instruction Fuzzy Hash: 161124B5904209CFDB10DF9AD444BEEBBF4AB88314F14842ED555A7200C778A945CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,010553E8,00000000,?), ref: 04F8E73D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.942501938.0000000004F80000.00000040.00000001.sdmp, Offset: 04F80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_4f80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: b6360d05373d5de9adf3e66b3db69efe9a5d21301f7bc01c6743da79da3a422f
                                                  • Instruction ID: cef850b63943fe451b76ef94cf71a12ea5030a780a5e49963b97d585dbe35a51
                                                  • Opcode Fuzzy Hash: b6360d05373d5de9adf3e66b3db69efe9a5d21301f7bc01c6743da79da3a422f
                                                  • Instruction Fuzzy Hash: AC116AB59003099FDB10DF99C845BEFBBF8EB48320F148419E954A7240D778A985CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,0108FE28,?,?,?,?), ref: 0108FE9D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: LongWindow
                                                  • String ID:
                                                  • API String ID: 1378638983-0
                                                  • Opcode ID: 2bc885fefca507de1926288ebf5e0098ac6016f3f3f7d58a0dfef5914883c22a
                                                  • Instruction ID: 5b4516dc2846b1639ca9caa81cf7524455fc8509994f661a4223709e4197a9c9
                                                  • Opcode Fuzzy Hash: 2bc885fefca507de1926288ebf5e0098ac6016f3f3f7d58a0dfef5914883c22a
                                                  • Instruction Fuzzy Hash: 131130B59002098FDB20DF99D585BDEBBF8EB48724F20841AE858B7241C378A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageW.USER32(?,00000018,00000001,?), ref: 04F8D29D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.942501938.0000000004F80000.00000040.00000001.sdmp, Offset: 04F80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_4f80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 4e4a3fd3a17b685f0f9b293177187f508edbd1574d29732c1ee20ec6b069ff8f
                                                  • Instruction ID: 164d4b17ca8ca00e870b8b7fd1a8092e25cc992476d4d1ec553cead7ca9ae0da
                                                  • Opcode Fuzzy Hash: 4e4a3fd3a17b685f0f9b293177187f508edbd1574d29732c1ee20ec6b069ff8f
                                                  • Instruction Fuzzy Hash: E111F5B59002099FDB10DF99D545BDEBBF8EB48324F148419E914B7240D775A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageW.USER32(?,?,?,?,?,?,?,04F8BC49,?,?,00000000), ref: 04F8BCBD
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.942501938.0000000004F80000.00000040.00000001.sdmp, Offset: 04F80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_4f80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: b9ee648a4869b9aea64b158d9c963e9b006b1d5cdd72f521a40981ec3a0dd2d9
                                                  • Instruction ID: dbfc5f81dc8b5c6e960e34aef863b9be61bc747df63e6898f83982283efd6398
                                                  • Opcode Fuzzy Hash: b9ee648a4869b9aea64b158d9c963e9b006b1d5cdd72f521a40981ec3a0dd2d9
                                                  • Instruction Fuzzy Hash: AD1122B59003089FDB10DF89D985BDFBBF8EB48324F148419E914AB200C778A984CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageW.USER32(?,0000020A,?,?,?,?,?,?,04F8226A,?,00000000,?), ref: 04F8C435
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.942501938.0000000004F80000.00000040.00000001.sdmp, Offset: 04F80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_4f80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 2c09c796be7e2ff0d6f414cd77eded2618ee08b2a02005cad8f1bca55958e87c
                                                  • Instruction ID: eb8a3bf5534e5365c05a3d291483deaff30d92c55b90a9164da0b8583693cf22
                                                  • Opcode Fuzzy Hash: 2c09c796be7e2ff0d6f414cd77eded2618ee08b2a02005cad8f1bca55958e87c
                                                  • Instruction Fuzzy Hash: 9A1148B58003489FDB10DF99D945BDFBBF8EB48324F108419E914B7600C374A985CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0108962E
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: d72f1a79ad80738e38b95d008dcfed97369df671c7d65f649b1b9a7c4af95072
                                                  • Instruction ID: 2871b6bd7878bd2d4b954dae20608901703514290ce4787c9f1298e2c1038516
                                                  • Opcode Fuzzy Hash: d72f1a79ad80738e38b95d008dcfed97369df671c7d65f649b1b9a7c4af95072
                                                  • Instruction Fuzzy Hash: 121110B5C006098FDB10DF9AD444BDEFBF4AF88228F14842AD859A7200C778A545CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,0108FE28,?,?,?,?), ref: 0108FE9D
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939419978.0000000001080000.00000040.00000001.sdmp, Offset: 01080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_1080000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: LongWindow
                                                  • String ID:
                                                  • API String ID: 1378638983-0
                                                  • Opcode ID: 2db129ee3f344275bfcd7ee2c08a86b7b732346a8097eaf7ae2d7cbd51cf625b
                                                  • Instruction ID: 7c7ace8d7a0f445d68d6a0f3c2bb8f0a59939e7a64d6f517cf20e1702f7515a1
                                                  • Opcode Fuzzy Hash: 2db129ee3f344275bfcd7ee2c08a86b7b732346a8097eaf7ae2d7cbd51cf625b
                                                  • Instruction Fuzzy Hash: D11145B59002098FDB10DF99D585BDFBBF8EB48324F14841AE954B7341C378A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 04F8F435
                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.942501938.0000000004F80000.00000040.00000001.sdmp, Offset: 04F80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_4f80000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID:
                                                  • API String ID: 2538663250-0
                                                  • Opcode ID: ff8a6c18c7ea705abe91795e72c24d6a35a357be3b715c254a32f26bd4d019b7
                                                  • Instruction ID: 393ee43181b17db12c7c148ddf914e4a0bf5c8b774f4c199f8ec3d3a1c7f4592
                                                  • Opcode Fuzzy Hash: ff8a6c18c7ea705abe91795e72c24d6a35a357be3b715c254a32f26bd4d019b7
                                                  • Instruction Fuzzy Hash: 851142B19002088FCB10DF99D589BDFBBF4EB48324F24841AE519BB600C778A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939177620.0000000000FED000.00000040.00000001.sdmp, Offset: 00FED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_fed000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: caf9ec5b40cc0be235ca3fb5dc24d0cca9c4d61d3d311fdc2610b7caef7fc5f0
                                                  • Instruction ID: cb52298bbf75028985f21fcac894beaa6671a0be0abab6d9773efa46db76268e
                                                  • Opcode Fuzzy Hash: caf9ec5b40cc0be235ca3fb5dc24d0cca9c4d61d3d311fdc2610b7caef7fc5f0
                                                  • Instruction Fuzzy Hash: F5210672904380DFDB01CF54D9C0B16BBA5FB94328F388569D9050B656C336D855EBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939204736.0000000000FFD000.00000040.00000001.sdmp, Offset: 00FFD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_ffd000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 62e7463e22556a8e5a14e0080e3b8458be506984c695afb0f6dc59a3d1b0d153
                                                  • Instruction ID: a82c0987fb26a25066109383447a75b08bffab933b5bd954ccdfc20cecca7c4e
                                                  • Opcode Fuzzy Hash: 62e7463e22556a8e5a14e0080e3b8458be506984c695afb0f6dc59a3d1b0d153
                                                  • Instruction Fuzzy Hash: 6821F571604248DFDB14DF14D5C0B26BBA6FF84324F34C569DA094B36ACB36D847EA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939204736.0000000000FFD000.00000040.00000001.sdmp, Offset: 00FFD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_ffd000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d6f647409aed394e18d3251a554d7858590fcaadd7f14f66f59fd815014713b
                                                  • Instruction ID: 7ceabca6cfa3ca723a98bdb9847bf92ad6466b92d5e4e462fc8ae22d9268434b
                                                  • Opcode Fuzzy Hash: 9d6f647409aed394e18d3251a554d7858590fcaadd7f14f66f59fd815014713b
                                                  • Instruction Fuzzy Hash: 992171755093848FCB02CF20D590715BF71EF46224F28C5EAD9498B6A7C33A980ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000A.00000002.939177620.0000000000FED000.00000040.00000001.sdmp, Offset: 00FED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_10_2_fed000_Payment confirmation .jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 14f94134bb014abb579cfd279659e17573a78b517b5aeb89abd8cbe1213a7701
                                                  • Instruction ID: e276dab27b4d3d4cd4530ac1d84ba68335002ed2281ecfd7d6281bcf791302bd
                                                  • Opcode Fuzzy Hash: 14f94134bb014abb579cfd279659e17573a78b517b5aeb89abd8cbe1213a7701
                                                  • Instruction Fuzzy Hash: 7C11B176804380CFDB12CF14D6C4B16BF71FB84324F28C6A9D8050B656C336D85ADBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions