Loading ...

Play interactive tourEdit tour

Windows Analysis Report Payment confirmation .exe

Overview

General Information

Sample Name:Payment confirmation .exe
Analysis ID:551433
MD5:aa035026516778019f8b8bd0e224fc03
SHA1:efae7e259b4581830c7e6bfeb94ed6dd25a54229
SHA256:39c5635ea42d63fe84500b9760fbe56e0fd3243007700749609bca1cd8d9e5d4
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Yara detected Nanocore RAT
Initial sample is a PE file and has a suspicious name
Connects to many ports of the same IP (likely port scanning)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Powershell Defender Exclusion
.NET source code contains method to dynamically call methods (often used by packers)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • Payment confirmation .exe (PID: 6996 cmdline: "C:\Users\user\Desktop\Payment confirmation .exe" MD5: AA035026516778019F8B8BD0E224FC03)
    • powershell.exe (PID: 3604 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 3600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 3116 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Payment confirmation .exe (PID: 5432 cmdline: C:\Users\user\Desktop\Payment confirmation .exe MD5: AA035026516778019F8B8BD0E224FC03)
    • Payment confirmation .exe (PID: 5520 cmdline: C:\Users\user\Desktop\Payment confirmation .exe MD5: AA035026516778019F8B8BD0E224FC03)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "2616a878-9933-42e4-9fe0-3b57e29b", "Domain1": "naki.airdns.org", "Domain2": "37.120.210.211", "Port": 56281, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "faff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    Click to see the 32 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    0.2.Payment confirmation .exe.363c208.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x5a9ad:$x1: NanoCore.ClientPluginHost
    • 0xa4fcd:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x5a9ea:$x2: IClientNetworkHost
    • 0xa500a:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x5e51d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0xa8b3d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0.2.Payment confirmation .exe.363c208.3.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0.2.Payment confirmation .exe.363c208.3.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0x5a715:$a: NanoCore
      • 0x5a725:$a: NanoCore
      • 0x5a959:$a: NanoCore
      • 0x5a96d:$a: NanoCore
      • 0x5a9ad:$a: NanoCore
      • 0xa4d35:$a: NanoCore
      • 0xa4d45:$a: NanoCore
      • 0xa4f79:$a: NanoCore
      • 0xa4f8d:$a: NanoCore
      • 0xa4fcd:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x5a774:$b: ClientPlugin
      • 0x5a976:$b: ClientPlugin
      • 0x5a9b6:$b: ClientPlugin
      10.2.Payment confirmation .exe.3a22a86.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0x145e3:$x1: NanoCore.ClientPluginHost
      • 0x3c845:$x1: NanoCore.ClientPluginHost
      • 0x556df:$x1: NanoCore.ClientPluginHost
      • 0x7d92d:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      • 0x14610:$x2: IClientNetworkHost
      • 0x3c85f:$x2: IClientNetworkHost
      • 0x5570c:$x2: IClientNetworkHost
      • 0x7d947:$x2: IClientNetworkHost
      10.2.Payment confirmation .exe.3a22a86.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x145e3:$x2: NanoCore.ClientPluginHost
      • 0x3c845:$x2: NanoCore.ClientPluginHost
      • 0x556df:$x2: NanoCore.ClientPluginHost
      • 0x7d92d:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0x156be:$s4: PipeCreated
      • 0x3fb82:$s4: PipeCreated
      • 0x567ba:$s4: PipeCreated
      • 0x80c6a:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      • 0x145fd:$s5: IClientLoggingHost
      • 0x3c832:$s5: IClientLoggingHost
      • 0x556f9:$s5: IClientLoggingHost
      • 0x7d91a:$s5: IClientLoggingHost
      Click to see the 69 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Payment confirmation .exe, ProcessId: 5520, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Payment confirmation .exe, ProcessId: 5520, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      System Summary:

      barindex
      Sigma detected: Suspicius Add Task From User AppData TempShow sources
      Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment confirmation .exe" , ParentImage: C:\Users\user\Desktop\Payment confirmation .exe, ParentProcessId: 6996, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp, ProcessId: 3116
      Sigma detected: Powershell Defender ExclusionShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment confirmation .exe" , ParentImage: C:\Users\user\Desktop\Payment confirmation .exe, ParentProcessId: 6996, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, ProcessId: 3604
      Sigma detected: Non Interactive PowerShellShow sources
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment confirmation .exe" , ParentImage: C:\Users\user\Desktop\Payment confirmation .exe, ParentProcessId: 6996, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe, ProcessId: 3604
      Sigma detected: T1086 PowerShell ExecutionShow sources
      Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132864459695901373.3604.DefaultAppDomain.powershell

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Payment confirmation .exe, ProcessId: 5520, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Payment confirmation .exe, ProcessId: 5520, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "2616a878-9933-42e4-9fe0-3b57e29b", "Domain1": "naki.airdns.org", "Domain2": "37.120.210.211", "Port": 56281, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "faff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Antivirus detection for URL or domainShow sources
      Source: 37.120.210.211Avira URL Cloud: Label: malware
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTR
      Machine Learning detection for sampleShow sources
      Source: Payment confirmation .exeJoe Sandbox ML: detected
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\QNRauI.exeJoe Sandbox ML: detected
      Source: 10.2.Payment confirmation .exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.2.Payment confirmation .exe.52e0000.7.unpackAvira: Label: TR/NanoCore.fadte
      Source: 10.0.Payment confirmation .exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.Payment confirmation .exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.Payment confirmation .exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.Payment confirmation .exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 10.0.Payment confirmation .exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: Payment confirmation .exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: Payment confirmation .exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Networking:

      barindex
      Connects to many ports of the same IP (likely port scanning)Show sources
      Source: global trafficTCP traffic: 146.70.76.43 ports 56281,1,2,5,6,8
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: 37.120.210.211
      Source: Malware configuration extractorURLs: naki.airdns.org
      Source: Joe Sandbox ViewASN Name: TENET-1ZA TENET-1ZA
      Source: global trafficTCP traffic: 192.168.2.4:49761 -> 146.70.76.43:56281
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677385911.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677536867.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677732929.0000000005409000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
      Source: Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comM
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: Payment confirmation .exe, 00000000.00000003.677558315.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677216510.0000000005403000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677385911.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677536867.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677732929.0000000005409000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comwit
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: Payment confirmation .exe, 00000000.00000003.684072387.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: Payment confirmation .exe, 00000000.00000003.679784035.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.679682374.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: Payment confirmation .exe, 00000000.00000003.683286235.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683406802.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683351862.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: Payment confirmation .exe, 00000000.00000003.683286235.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683351862.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmld
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: Payment confirmation .exe, 00000000.00000003.680816196.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersIUy
      Source: Payment confirmation .exe, 00000000.00000003.679938204.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.694073095.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.679784035.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersTUF
      Source: Payment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersico
      Source: Payment confirmation .exe, 00000000.00000003.694073095.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersnox
      Source: Payment confirmation .exe, 00000000.00000003.683542352.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers~
      Source: Payment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers~Ul
      Source: Payment confirmation .exe, 00000000.00000002.729385777.0000000000A74000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.commfet
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.676069541.000000000542F000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: Payment confirmation .exe, 00000000.00000003.687634241.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: Payment confirmation .exe, 00000000.00000003.687703540.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687634241.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/~Rm
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)
      Source: Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/;
      Source: Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/C
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/L
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/O
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/)
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/;
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/C
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/p
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/pt-b
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
      Source: Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/y
      Source: Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/z
      Source: Payment confirmation .exe, 00000000.00000003.680816196.0000000005433000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.
      Source: Payment confirmation .exe, 00000000.00000003.687529964.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687463634.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687617708.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687425665.000000000544C000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.p
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677972229.000000000542C000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: Payment confirmation .exe, 00000000.00000003.677944436.000000000542C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677972229.000000000542C000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com.
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.como
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: unknownDNS traffic detected: queries for: naki.airdns.org
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTR

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.52d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.62b4c9f.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.62b0000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.29e4fc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.62b0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.62be8a4.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: Payment confirmation .exe
      Source: Payment confirmation .exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.52d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.52d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.62b4c9f.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.62b4c9f.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.62b0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.62b0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.29e4fc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.29e4fc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.62b0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.62b0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.62be8a4.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.62be8a4.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00082594
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2C164
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2E5A0
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2E5B0
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2FBE0
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_07360EB6
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_07360026
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_07360040
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 9_2_000C2594
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_006A2594
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_0108E471
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_0108E480
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_0108BBD4
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_04F8F5F8
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 10_2_04F89788
      Source: Payment confirmation .exeBinary or memory string: OriginalFilename vs Payment confirmation .exe
      Source: Payment confirmation .exe, 00000000.00000003.697326569.000000000349E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs Payment confirmation .exe
      Source: Payment confirmation .exe, 00000000.00000002.734838256.00000000071E0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs Payment confirmation .exe
      Source: Payment confirmation .exeBinary or memory string: OriginalFilename vs Payment confirmation .exe
      Source: Payment confirmation .exeBinary or memory string: OriginalFilename vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Payment confirmation .exe
      Source: Payment confirmation .exeBinary or memory string: OriginalFilenameOnDeserializingAttribu.exe2 vs Payment confirmation .exe
      Source: Payment confirmation .exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: QNRauI.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile read: C:\Users\user\Desktop\Payment confirmation .exeJump to behavior
      Source: Payment confirmation .exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Payment confirmation .exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\Payment confirmation .exe "C:\Users\user\Desktop\Payment confirmation .exe"
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile created: C:\Users\user\AppData\Roaming\QNRauI.exeJump to behavior
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile created: C:\Users\user\AppData\Local\Temp\tmpEEA4.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@11/10@14/1
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: C:\Users\user\Desktop\Payment confirmation .exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\Payment confirmation .exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5036:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3600:120:WilError_01
      Source: C:\Users\user\Desktop\Payment confirmation .exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2616a878-9933-42e4-9fe0-3b57e29bc1f5}
      Source: C:\Users\user\Desktop\Payment confirmation .exeMutant created: \Sessions\1\BaseNamedObjects\lresUOKKCheNReqlZnYyzR
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: Payment confirmation .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Payment confirmation .exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: Payment confirmation .exe, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: QNRauI.exe.0.dr, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.2.Payment confirmation .exe.80000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.Payment confirmation .exe.80000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.0.Payment confirmation .exe.c0000.3.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.0.Payment confirmation .exe.c0000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.0.Payment confirmation .exe.c0000.1.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.2.Payment confirmation .exe.c0000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.0.Payment confirmation .exe.c0000.2.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.5.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.9.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.11.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.1.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.13.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.2.Payment confirmation .exe.6a0000.1.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 10.0.Payment confirmation .exe.6a0000.0.unpack, Form1.cs.Net Code: CALLCONV System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      .NET source code contains method to dynamically call methods (often used by packers)Show sources
      Source: Payment confirmation .exe, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: QNRauI.exe.0.dr, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 0.2.Payment confirmation .exe.80000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 0.0.Payment confirmation .exe.80000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.0.Payment confirmation .exe.c0000.3.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.0.Payment confirmation .exe.c0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.0.Payment confirmation .exe.c0000.1.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.2.Payment confirmation .exe.c0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 9.0.Payment confirmation .exe.c0000.2.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.5.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.9.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.11.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.1.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.13.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.2.Payment confirmation .exe.6a0000.1.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: 10.0.Payment confirmation .exe.6a0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
      Source: C:\Users\user\Desktop\Payment confirmation .exeCode function: 0_2_00A2F970 pushfd ; iretd
      Source: initial sampleStatic PE information: section name: .text entropy: 7.96359768292
      Source: initial sampleStatic PE information: section name: .text entropy: 7.96359768292
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.2.Payment confirmation .exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.0.Payment confirmation .exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 10.0.Payment confirmation .exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile created: C:\Users\user\AppData\Roaming\QNRauI.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\Payment confirmation .exeFile opened: C:\Users\user\Desktop\Payment confirmation .exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM3Show sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.242da04.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.730307873.0000000002611000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: Payment confirmation .exe, 00000000.00000002.730307873.0000000002611000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: Payment confirmation .exe, 00000000.00000002.730307873.0000000002611000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
      Source: C:\Users\user\Desktop\Payment confirmation .exe TID: 7000Thread sleep time: -39064s >= -30000s
      Source: C:\Users\user\Desktop\Payment confirmation .exe TID: 7024Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4260Thread sleep time: -7378697629483816s >= -30000s
      Source: C:\Users\user\Desktop\Payment confirmation .exe TID: 6760Thread sleep time: -10145709240540247s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4870
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3864
      Source: C:\Users\user\Desktop\Payment confirmation .exeWindow / User API: threadDelayed 3782
      Source: C:\Users\user\Desktop\Payment confirmation .exeWindow / User API: threadDelayed 5112
      Source: C:\Users\user\Desktop\Payment confirmation .exeWindow / User API: foregroundWindowGot 769
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 39064
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\Payment confirmation .exeThread delayed: delay time: 922337203685477
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: Payment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Payment confirmation .exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\Payment confirmation .exeMemory written: C:\Users\user\Desktop\Payment confirmation .exe base: 400000 value starts with: 4D5A
      Adds a directory exclusion to Windows DefenderShow sources
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exe
      Source: C:\Users\user\Desktop\Payment confirmation .exeProcess created: C:\Users\user\Desktop\Payment confirmation .exe C:\Users\user\Desktop\Payment confirmation .exe
      Source: Payment confirmation .exe, 0000000A.00000002.940923801.0000000002E46000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.941005381.0000000002E96000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.941108443.0000000002ED0000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.939580012.0000000001440000.00000002.00020000.sdmp, Payment confirmation .exe, 0000000A.00000002.941061864.0000000002ECE000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.944136866.000000000615D000.00000004.00000010.sdmp, Payment confirmation .exe, 0000000A.00000002.944077289.000000000601D000.00000004.00000010.sdmp, Payment confirmation .exe, 0000000A.00000002.944022787.0000000005DDC000.00000004.00000010.sdmp, Payment confirmation .exe, 0000000A.00000002.939799082.00000000029FB000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.939992078.0000000002AE8000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: Payment confirmation .exe, 0000000A.00000002.939580012.0000000001440000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: Payment confirmation .exe, 0000000A.00000002.939580012.0000000001440000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: Payment confirmation .exe, 0000000A.00000002.940923801.0000000002E46000.00000004.00000001.sdmp, Payment confirmation .exe, 0000000A.00000002.939992078.0000000002AE8000.00000004.00000001.sdmpBinary or memory string: Program Manager|$
      Source: Payment confirmation .exe, 0000000A.00000002.939580012.0000000001440000.00000002.00020000.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Users\user\Desktop\Payment confirmation .exe VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Users\user\Desktop\Payment confirmation .exe VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\Payment confirmation .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTR

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: Payment confirmation .exe, 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Payment confirmation .exe, 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Payment confirmation .exe, 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Payment confirmation .exe, 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Payment confirmation .exe, 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: Payment confirmation .exe, 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a22a86.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a2bee5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e4629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.3686a28.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.0.Payment confirmation .exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.52e0000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.Payment confirmation .exe.363c208.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 10.2.Payment confirmation .exe.3a278bc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 6996, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: Payment confirmation .exe PID: 5520, type: MEMORYSTR

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Masquerading1Input Capture11Security Software Discovery11Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools11LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing23Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 551433 Sample: Payment confirmation .exe Startdate: 12/01/2022 Architecture: WINDOWS Score: 100 37 naki.airdns.org 2->37 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 47 16 other signatures 2->47 8 Payment confirmation .exe 7 2->8         started        signatures3 process4 file5 27 C:\Users\user\AppData\Roaming\QNRauI.exe, PE32 8->27 dropped 29 C:\Users\user\...\QNRauI.exe:Zone.Identifier, ASCII 8->29 dropped 31 C:\Users\user\AppData\Local\...\tmpEEA4.tmp, XML 8->31 dropped 33 C:\Users\...\Payment confirmation .exe.log, ASCII 8->33 dropped 49 Adds a directory exclusion to Windows Defender 8->49 51 Injects a PE file into a foreign processes 8->51 12 Payment confirmation .exe 7 8->12         started        17 powershell.exe 25 8->17         started        19 schtasks.exe 1 8->19         started        21 Payment confirmation .exe 8->21         started        signatures6 process7 dnsIp8 39 naki.airdns.org 146.70.76.43, 49761, 49762, 49763 TENET-1ZA United Kingdom 12->39 35 C:\Users\user\AppData\Roaming\...\run.dat, SysEx 12->35 dropped 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->53 23 conhost.exe 17->23         started        25 conhost.exe 19->25         started        file9 signatures10 process11

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Payment confirmation .exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\QNRauI.exe100%Joe Sandbox ML

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      10.2.Payment confirmation .exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.2.Payment confirmation .exe.52e0000.7.unpack100%AviraTR/NanoCore.fadteDownload File
      10.0.Payment confirmation .exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.Payment confirmation .exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.Payment confirmation .exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.Payment confirmation .exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      10.0.Payment confirmation .exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://www.jiyu-kobo.co.jp/jp/C0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      37.120.210.211100%Avira URL Cloudmalware
      naki.airdns.org0%Avira URL Cloudsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.carterandcone.com0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/;0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/pt-b0%Avira URL Cloudsafe
      http://www.monotype.p0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/)0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.carterandcone.comM0%URL Reputationsafe
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.fontbureau.commfet0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/O0%URL Reputationsafe
      http://www.tiro.como0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/C0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/;0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/y0%URL Reputationsafe
      http://www.sakkal.com.0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/z0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
      http://www.monotype.0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/)0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/p0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.carterandcone.comwit0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/~Rm0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      naki.airdns.org
      146.70.76.43
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        37.120.210.211true
        • Avira URL Cloud: malware
        unknown
        naki.airdns.orgtrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designersGPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designersIUyPayment confirmation .exe, 00000000.00000003.680816196.0000000005433000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designers/?Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/jp/CPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/bThePayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                high
                http://www.tiro.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersPayment confirmation .exe, 00000000.00000003.684072387.0000000005433000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designersnoxPayment confirmation .exe, 00000000.00000003.694073095.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpfalse
                    high
                    http://www.goodfont.co.krPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comPayment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677385911.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677536867.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677732929.0000000005409000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/;Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cThePayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/pt-bPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.monotype.pPayment confirmation .exe, 00000000.00000003.687529964.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687463634.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687617708.000000000544C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687425665.000000000544C000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designersTUFPayment confirmation .exe, 00000000.00000003.679938204.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.694073095.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.679784035.0000000005433000.00000004.00000001.sdmpfalse
                      high
                      http://www.galapagosdesign.com/DPleasePayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/)Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/Y0Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.krPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleasePayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePayment confirmation .exe, 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmpfalse
                          high
                          http://www.sakkal.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677972229.000000000542C000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comMPayment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                              high
                              http://www.galapagosdesign.com/Payment confirmation .exe, 00000000.00000003.687634241.0000000005433000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.commfetPayment confirmation .exe, 00000000.00000002.729385777.0000000000A74000.00000004.00000040.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/OPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers~Payment confirmation .exe, 00000000.00000003.683542352.0000000005433000.00000004.00000001.sdmpfalse
                                high
                                http://www.tiro.comoPayment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/LPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/CPayment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designersicoPayment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers/cabarga.htmldPayment confirmation .exe, 00000000.00000003.683286235.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683351862.0000000005433000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.carterandcone.comlPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/;Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/yPayment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.com.Payment confirmation .exe, 00000000.00000003.677944436.000000000542C000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677972229.000000000542C000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/zPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.676069541.000000000542F000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-user.htmlPayment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.jiyu-kobo.co.jp/tPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlPayment confirmation .exe, 00000000.00000003.683286235.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683406802.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.683351862.0000000005433000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/Y0/Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.monotype.Payment confirmation .exe, 00000000.00000003.680816196.0000000005433000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/jp/)Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/pPayment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/Payment confirmation .exe, 00000000.00000003.677709539.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677319400.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677594577.0000000000A7B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677183385.0000000000A7B000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comwitPayment confirmation .exe, 00000000.00000003.677558315.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677216510.0000000005403000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.676666365.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677385911.0000000005408000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677536867.000000000540B000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.677732929.0000000005409000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designers8Payment confirmation .exe, 00000000.00000002.733298449.0000000006612000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.galapagosdesign.com/~RmPayment confirmation .exe, 00000000.00000003.687703540.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.687634241.0000000005433000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers~UlPayment confirmation .exe, 00000000.00000003.694127722.0000000005433000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.fontbureau.com/designers/Payment confirmation .exe, 00000000.00000003.679784035.0000000005433000.00000004.00000001.sdmp, Payment confirmation .exe, 00000000.00000003.679682374.0000000005433000.00000004.00000001.sdmpfalse
                                                high

                                                Contacted IPs

                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs

                                                Public

                                                IPDomainCountryFlagASNASN NameMalicious
                                                146.70.76.43
                                                naki.airdns.orgUnited Kingdom
                                                2018TENET-1ZAtrue

                                                General Information

                                                Joe Sandbox Version:34.0.0 Boulder Opal
                                                Analysis ID:551433
                                                Start date:12.01.2022
                                                Start time:08:24:50
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 11m 29s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:Payment confirmation .exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:22
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@11/10@14/1
                                                EGA Information:
                                                • Successful, ratio: 66.7%
                                                HDC Information:
                                                • Successful, ratio: 34.8% (good quality ratio 17.4%)
                                                • Quality average: 37.2%
                                                • Quality standard deviation: 38%
                                                HCA Information:
                                                • Successful, ratio: 99%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Found application associated with file extension: .exe
                                                Warnings:
                                                Show All
                                                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                • TCP Packets have been reduced to 100
                                                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, go.microsoft.com, store-images.s-microsoft.com, settings-win.data.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                • Execution Graph export aborted for target Payment confirmation .exe, PID 5432 because there are no executed function
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.

                                                Simulations

                                                Behavior and APIs

                                                TimeTypeDescription
                                                08:26:02API Interceptor831x Sleep call for process: Payment confirmation .exe modified
                                                08:26:12API Interceptor44x Sleep call for process: powershell.exe modified

                                                Joe Sandbox View / Context

                                                IPs

                                                No context

                                                Domains

                                                No context

                                                ASN

                                                No context

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment confirmation .exe.log
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):1310
                                                Entropy (8bit):5.345651901398759
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                                                MD5:A9EFF9253CAF99EC8665E41D736DDAED
                                                SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                                                SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                                                SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                                                Malicious:true
                                                Reputation:moderate, very likely benign file
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):22280
                                                Entropy (8bit):5.603448558149079
                                                Encrypted:false
                                                SSDEEP:384:GtCDm0k8v6v30rXSJScSBKnYjultIab7Y9gtbSJ3xyT1MaDZlbAV7O4l6ZBDI+ip:eQ23MXE4KYClt17hcwC6fwoVg
                                                MD5:438CEF22F7B9AB115F27C9E03ED52A92
                                                SHA1:3E50A0EF10FB3EE05A1772B685114078755E461C
                                                SHA-256:4DDC221F1F2DA6CD48D3117C60008429D9F2631F0BF7C5DF8927989ECBB05CCC
                                                SHA-512:BB186A39B67EA9D43ED556451FCE481451C5A8F995867FC84CD7D1815D1D5A6BB1323710979FF0CF0378E2C5439318E3ED42CEBEA7212213AA293BC2763DFA0C
                                                Malicious:false
                                                Reputation:low
                                                Preview: @...e...........y.......h.............y...I..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2qnk0ivh.iyj.ps1
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:very short file (no magic)
                                                Category:dropped
                                                Size (bytes):1
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3:U:U
                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview: 1
                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mevy52tz.tt5.psm1
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:very short file (no magic)
                                                Category:dropped
                                                Size (bytes):1
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3:U:U
                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                Malicious:false
                                                Preview: 1
                                                C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:XML 1.0 document, ASCII text
                                                Category:dropped
                                                Size (bytes):1593
                                                Entropy (8bit):5.1360806454884385
                                                Encrypted:false
                                                SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtadxvn:cgeKwYrFdOFzOzN33ODOiDdKrsuT+v
                                                MD5:B0A91C23E82AA9831131A946DC8882B2
                                                SHA1:6ACB72396925F2655F17259CB41980C1E77B5BBB
                                                SHA-256:830508EBB4A30C675781AA7A61A4A3B41379B090CC472B86368AA906849E39B8
                                                SHA-512:3B0104905227E5357708DE138902E7FD99DD89145A829B1EFC5878097A3DC49CCF0E0162629D019E30B39DA89D5E1050553A7F749A9B29AC47D899B9DAC44158
                                                Malicious:true
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):232
                                                Entropy (8bit):7.024371743172393
                                                Encrypted:false
                                                SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                                MD5:32D0AAE13696FF7F8AF33B2D22451028
                                                SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                                SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                                SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                                Malicious:false
                                                Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:SysEx File - Twister
                                                Category:dropped
                                                Size (bytes):8
                                                Entropy (8bit):3.0
                                                Encrypted:false
                                                SSDEEP:3:p2Bn:e
                                                MD5:6D4C80C6B89E030207C12FF4661B6118
                                                SHA1:7401D0D745A13BD2905E25C23E65421C382391A9
                                                SHA-256:EBABE9E7478812E1D324E5F7D94EFA80B73BAB3E1A3CFC9E155047BC3858344F
                                                SHA-512:812A64696E0931C6B19AA555B24F21003D58758276ACE42F45F9A58BFEFD67FD3AA2089B2F17285D6D498507E8B2411BEB11D9B93490F849ABC8225A911A6741
                                                Malicious:true
                                                Preview: .%7...H
                                                C:\Users\user\AppData\Roaming\QNRauI.exe
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):542720
                                                Entropy (8bit):7.954488841460159
                                                Encrypted:false
                                                SSDEEP:12288:bXGyj7pcvY2GblmQ1S3IAHQ7RBw/73iErP:fTc3bwNBwuEr
                                                MD5:AA035026516778019F8B8BD0E224FC03
                                                SHA1:EFAE7E259B4581830C7E6BFEB94ED6DD25A54229
                                                SHA-256:39C5635EA42D63FE84500B9760FBE56E0FD3243007700749609BCA1CD8D9E5D4
                                                SHA-512:A2CBCE6A6597479167089339504B7BC39BAE9845F2295397062F2FFE1B79037A5640208663A5E208D87856CEEADD1EFE061B933ED69A79D572BD597F3FF75899
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....v.a..............0..<..........NZ... ...`....@.. ....................................@..................................Y..O....`............................................................................... ............... ..H............text...T:... ...<.................. ..`.rsrc........`.......>..............@..@.reloc...............F..............@..B................0Z......H........L...\......6...|...............................................&.(......**..(......*....0...........r...pr...p.QsF....+..*..0...........r;..prA..p.EsF....+..*..0...........rw..pr...p.VsF....+..*..0...........r...pr...p.JsF....+..*..0...........r...pr...p.ZsF....+..*..0...........r+..pr1..p.Z.MsG....+..*....0...........rg..pro..p.Z.MsG....+..*....0...........r...pr...p.Z.MsG....+..*....0...........r...pr...ps=....+..*....0...........r...pr#..ps=....+..*....0..........
                                                C:\Users\user\AppData\Roaming\QNRauI.exe:Zone.Identifier
                                                Process:C:\Users\user\Desktop\Payment confirmation .exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Preview: [ZoneTransfer]....ZoneId=0
                                                C:\Users\user\Documents\20220112\PowerShell_transcript.830021.GhMaXGHf.20220112082610.txt
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):5773
                                                Entropy (8bit):5.39117162081354
                                                Encrypted:false
                                                SSDEEP:96:BZIjKNxqDo1ZSZNjKNxqDo1ZxrpzjZ/jKNxqDo1Zbajj5Zh:x
                                                MD5:322C10DE7FC412A3E88EABCEB5DD0130
                                                SHA1:51593CE60CD26DD9EF22B0784C44CB381CE5D4A8
                                                SHA-256:43AD0D4351316231CFCB26AC59E6F01839779EEFF38D961A10D251ACE4172D9B
                                                SHA-512:5BECB37FE14E9735811D84CD391891E276FE903A0CCD0D42D3782AEE792A06F01B9A37A72FDC207F331CADB7894CF933CE35F579AED2A73B55AFB78B0A052B83
                                                Malicious:false
                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20220112082611..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 830021 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\QNRauI.exe..Process ID: 3604..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220112082611..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\QNRauI.exe..**********************..Windows PowerShell transcript start..Start time: 20220112083015..Username: computer\user..RunAs User: computer\user..Confi

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.954488841460159
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:Payment confirmation .exe
                                                File size:542720
                                                MD5:aa035026516778019f8b8bd0e224fc03
                                                SHA1:efae7e259b4581830c7e6bfeb94ed6dd25a54229
                                                SHA256:39c5635ea42d63fe84500b9760fbe56e0fd3243007700749609bca1cd8d9e5d4
                                                SHA512:a2cbce6a6597479167089339504b7bc39bae9845f2295397062f2ffe1b79037a5640208663a5e208d87856ceeadd1efe061b933ed69a79d572bd597f3ff75899
                                                SSDEEP:12288:bXGyj7pcvY2GblmQ1S3IAHQ7RBw/73iErP:fTc3bwNBwuEr
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....v.a..............0..<..........NZ... ...`....@.. ....................................@................................

                                                File Icon

                                                Icon Hash:00828e8e8686b000

                                                Static PE Info

                                                General

                                                Entrypoint:0x485a4e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x61DE7680 [Wed Jan 12 06:34:40 2022 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x859fc0x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x6d4.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x83a540x83c00False0.961252520161data7.96359768292IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0x860000x6d40x800False0.37109375data3.68471441086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x880000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_VERSION0x860900x444data
                                                RT_MANIFEST0x864e40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyrightCopyright Development In Progress Ltd 2015
                                                Assembly Version2.0.0.0
                                                InternalNameOnDeserializingAttribu.exe
                                                FileVersion2.0.0.0
                                                CompanyNameDevelopment In Progress Ltd
                                                LegalTrademarks
                                                CommentsA simple mechanism to maintain state for an activity based workflow
                                                ProductNameDipState
                                                ProductVersion2.0.0.0
                                                FileDescriptionDipState
                                                OriginalFilenameOnDeserializingAttribu.exe

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 12, 2022 08:26:21.496448994 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:22.120800972 CET5628149761146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:22.120923042 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:22.169342041 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:22.806607962 CET5628149761146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:22.886548042 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:23.670886993 CET5628149761146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:23.670964003 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:24.113238096 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:24.461231947 CET5628149761146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:24.463196993 CET4976156281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:28.601921082 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:29.336673975 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:29.336815119 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:29.337460041 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:30.403642893 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:30.403872967 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:31.048769951 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:31.049668074 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:31.680993080 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:31.681144953 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:32.112807035 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:32.365627050 CET5628149762146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:32.365787029 CET4976256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:36.703120947 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:37.318804026 CET5628149763146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:37.318968058 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:37.320342064 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:38.045265913 CET5628149763146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:38.045907974 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:38.754287958 CET5628149763146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:38.754364967 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:39.186594963 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:39.422841072 CET5628149763146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:39.422904968 CET4976356281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:44.189121962 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:44.937760115 CET5628149764146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:44.938009977 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:45.537900925 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:46.152734995 CET5628149764146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:46.153064966 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:46.791004896 CET5628149764146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:46.791949987 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:47.401065111 CET5628149764146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:47.441382885 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:47.587512970 CET4976456281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:52.017040014 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:52.662681103 CET5628149782146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:52.663507938 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:52.664336920 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:53.306962013 CET5628149782146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:53.307307005 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:53.926824093 CET5628149782146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:53.926914930 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:54.590934992 CET5628149782146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:54.614583015 CET4978256281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:59.051279068 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:59.664710999 CET5628149800146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:26:59.664861917 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:26:59.665734053 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:00.306605101 CET5628149800146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:00.310446024 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:00.944751978 CET5628149800146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:00.944825888 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:01.615020990 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:01.750566959 CET5628149800146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:01.750693083 CET4980056281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:05.965873003 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:06.588663101 CET5628149807146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:06.588757992 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:06.589562893 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:07.352962971 CET5628149807146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:07.353127003 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:08.115328074 CET5628149807146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:08.115432024 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:08.677973032 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:08.926760912 CET5628149807146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:08.926947117 CET4980756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:13.191730022 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:13.806905031 CET5628149809146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:13.807552099 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:13.808307886 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:14.548984051 CET5628149809146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:14.551913023 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:15.320391893 CET5628149809146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:15.320805073 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:15.757601976 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:16.172713041 CET5628149809146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:16.172801018 CET4980956281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:20.217061996 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:20.880790949 CET5628149827146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:20.881078005 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:20.888781071 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:21.752861023 CET5628149827146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:21.752984047 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:22.616928101 CET5628149827146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:22.617002010 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:22.913781881 CET4982756281192.168.2.4146.70.76.43
                                                Jan 12, 2022 08:27:23.307008028 CET5628149827146.70.76.43192.168.2.4
                                                Jan 12, 2022 08:27:23.307956934 CET4982756281192.168.2.4146.70.76.43

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 12, 2022 08:26:21.358510017 CET6238953192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:21.463951111 CET53623898.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:28.396239996 CET4991053192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:28.600332975 CET53499108.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:36.512564898 CET5585453192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:36.701642990 CET53558548.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:44.168963909 CET6454953192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:44.187479019 CET53645498.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:51.997921944 CET6311653192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:52.014723063 CET53631168.8.8.8192.168.2.4
                                                Jan 12, 2022 08:26:59.029360056 CET6407853192.168.2.48.8.8.8
                                                Jan 12, 2022 08:26:59.048402071 CET53640788.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:05.947813034 CET6172153192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:05.964391947 CET53617218.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:13.125575066 CET5125553192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:13.144364119 CET53512558.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:20.194072008 CET6152253192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:20.212605953 CET53615228.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:27.167675972 CET5233753192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:27.183885098 CET53523378.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:35.424280882 CET5504653192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:35.440875053 CET53550468.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:43.627265930 CET4928553192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:43.646083117 CET53492858.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:50.791979074 CET6087553192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:50.810436010 CET53608758.8.8.8192.168.2.4
                                                Jan 12, 2022 08:27:58.324325085 CET5644853192.168.2.48.8.8.8
                                                Jan 12, 2022 08:27:58.343009949 CET53564488.8.8.8192.168.2.4

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Jan 12, 2022 08:26:21.358510017 CET192.168.2.48.8.8.80xa905Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:28.396239996 CET192.168.2.48.8.8.80x5745Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:36.512564898 CET192.168.2.48.8.8.80xf50Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:44.168963909 CET192.168.2.48.8.8.80x6babStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:51.997921944 CET192.168.2.48.8.8.80xf097Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:59.029360056 CET192.168.2.48.8.8.80x5e15Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:05.947813034 CET192.168.2.48.8.8.80x7c75Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:13.125575066 CET192.168.2.48.8.8.80xb2dfStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:20.194072008 CET192.168.2.48.8.8.80x37dStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:27.167675972 CET192.168.2.48.8.8.80x4dd2Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:35.424280882 CET192.168.2.48.8.8.80x70e1Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:43.627265930 CET192.168.2.48.8.8.80x150bStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:50.791979074 CET192.168.2.48.8.8.80xa18aStandard query (0)naki.airdns.orgA (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:58.324325085 CET192.168.2.48.8.8.80xf965Standard query (0)naki.airdns.orgA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Jan 12, 2022 08:26:21.463951111 CET8.8.8.8192.168.2.40xa905No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:28.600332975 CET8.8.8.8192.168.2.40x5745No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:36.701642990 CET8.8.8.8192.168.2.40xf50No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:44.187479019 CET8.8.8.8192.168.2.40x6babNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:52.014723063 CET8.8.8.8192.168.2.40xf097No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:26:59.048402071 CET8.8.8.8192.168.2.40x5e15No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:05.964391947 CET8.8.8.8192.168.2.40x7c75No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:13.144364119 CET8.8.8.8192.168.2.40xb2dfNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:20.212605953 CET8.8.8.8192.168.2.40x37dNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:27.183885098 CET8.8.8.8192.168.2.40x4dd2No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:35.440875053 CET8.8.8.8192.168.2.40x70e1No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:43.646083117 CET8.8.8.8192.168.2.40x150bNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:50.810436010 CET8.8.8.8192.168.2.40xa18aNo error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)
                                                Jan 12, 2022 08:27:58.343009949 CET8.8.8.8192.168.2.40xf965No error (0)naki.airdns.org146.70.76.43A (IP address)IN (0x0001)

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:08:25:51
                                                Start date:12/01/2022
                                                Path:C:\Users\user\Desktop\Payment confirmation .exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Payment confirmation .exe"
                                                Imagebase:0x80000
                                                File size:542720 bytes
                                                MD5 hash:AA035026516778019F8B8BD0E224FC03
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.730307873.0000000002611000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.730520964.00000000034AE000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.729736514.0000000002401000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                General

                                                Start time:08:26:09
                                                Start date:12/01/2022
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QNRauI.exe
                                                Imagebase:0x1210000
                                                File size:430592 bytes
                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Reputation:high

                                                General

                                                Start time:08:26:09
                                                Start date:12/01/2022
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:26:10
                                                Start date:12/01/2022
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QNRauI" /XML "C:\Users\user\AppData\Local\Temp\tmpEEA4.tmp
                                                Imagebase:0x1060000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:26:12
                                                Start date:12/01/2022
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:26:13
                                                Start date:12/01/2022
                                                Path:C:\Users\user\Desktop\Payment confirmation .exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Users\user\Desktop\Payment confirmation .exe
                                                Imagebase:0xc0000
                                                File size:542720 bytes
                                                MD5 hash:AA035026516778019F8B8BD0E224FC03
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                General

                                                Start time:08:26:14
                                                Start date:12/01/2022
                                                Path:C:\Users\user\Desktop\Payment confirmation .exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\Payment confirmation .exe
                                                Imagebase:0x6a0000
                                                File size:542720 bytes
                                                MD5 hash:AA035026516778019F8B8BD0E224FC03
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.938485517.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.943461917.00000000052E0000.00000004.00020000.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.726108630.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.939719570.0000000002991000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.725697344.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.726654593.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.944294212.00000000062B0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.941482368.0000000003A19000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.724292610.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.943393198.00000000052D0000.00000004.00020000.sdmp, Author: Florian Roth
                                                Reputation:low

                                                Disassembly

                                                Code Analysis

                                                Reset < >