Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
e1f388b8a086e034b1fbd94ca7341008.exe

Overview

General Information

Sample Name:e1f388b8a086e034b1fbd94ca7341008.exe
Analysis ID:623326
MD5:916eb825989bc96a10eab8916995c1e1
SHA1:e91e3a11ab3203c912b5d756c5f22e620760edf9
SHA256:6e5ce2c28b65e3f50c89ee799de9c047c07ec4c27b4d4b8b6f4f202b1e8d557a
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Connects to many ports of the same IP (likely port scanning)
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • e1f388b8a086e034b1fbd94ca7341008.exe (PID: 6952 cmdline: "C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe" MD5: 916EB825989BC96A10EAB8916995C1E1)
    • powershell.exe (PID: 5508 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5204 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgGSCvPvvCY" /XML "C:\Users\user\AppData\Local\Temp\tmp5BA5.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "a63bf89b-7de8-4696-9653-4f27004d", "Group": "APRILO", "Domain1": "ella666.duckdns.org", "Domain2": "mikeljack321.ddns.net", "Port": 31789, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "ella666.duckdns.org"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      00000000.00000002.293486073.0000000002DEB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 31 entries
        SourceRuleDescriptionAuthorStrings
        8.2.e1f388b8a086e034b1fbd94ca7341008.exe.5540000.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        8.2.e1f388b8a086e034b1fbd94ca7341008.exe.5540000.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        8.2.e1f388b8a086e034b1fbd94ca7341008.exe.5540000.5.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0xe38:$x2: NanoCore.ClientPlugin
        • 0xe75:$x3: NanoCore.ClientPluginHost
        • 0xe5a:$i1: IClientApp
        • 0xe4e:$i2: IClientData
        • 0xe29:$i3: IClientNetwork
        • 0xec3:$i4: IClientAppHost
        • 0xe65:$i5: IClientDataHost
        • 0xeb0:$i6: IClientLoggingHost
        • 0xe8f:$i7: IClientNetworkHost
        • 0xea2:$i8: IClientUIHost
        • 0xed2:$i9: IClientNameObjectCollection
        • 0xef7:$i10: IClientReadOnlyNameObjectCollection
        • 0xe41:$s1: ClientPlugin
        • 0x177c:$s1: ClientPlugin
        • 0x1789:$s1: ClientPlugin
        • 0x11f9:$s6: get_ClientSettings
        • 0x1249:$s7: get_Connected
        8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xd9ad:$x2: NanoCore.ClientPluginHost
        • 0xea88:$s4: PipeCreated
        • 0xd9c7:$s5: IClientLoggingHost
        Click to see the 78 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe, ProcessId: 3312, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe, ProcessId: 3312, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe, ProcessId: 3312, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe, ProcessId: 3312, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Timestamp:192.168.2.3185.140.53.349767317892025019 05/10/22-11:54:04.775428
        SID:2025019
        Source Port:49767
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349778317892025019 05/10/22-11:54:18.335094
        SID:2025019
        Source Port:49778
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349826317892816766 05/10/22-11:54:42.317503
        SID:2816766
        Source Port:49826
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349867317892816766 05/10/22-11:55:08.482183
        SID:2816766
        Source Port:49867
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349868317892816766 05/10/22-11:55:15.380950
        SID:2816766
        Source Port:49868
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349843317892816766 05/10/22-11:54:56.333885
        SID:2816766
        Source Port:49843
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349762317892025019 05/10/22-11:53:57.886255
        SID:2025019
        Source Port:49762
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349758317892025019 05/10/22-11:53:52.880985
        SID:2025019
        Source Port:49758
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349782317892025019 05/10/22-11:54:25.487213
        SID:2025019
        Source Port:49782
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349771317892025019 05/10/22-11:54:11.319386
        SID:2025019
        Source Port:49771
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349750317892025019 05/10/22-11:53:37.365565
        SID:2025019
        Source Port:49750
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349752317892025019 05/10/22-11:53:45.193397
        SID:2025019
        Source Port:49752
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349750317892816766 05/10/22-11:53:38.950679
        SID:2816766
        Source Port:49750
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349782317892816766 05/10/22-11:54:26.713499
        SID:2816766
        Source Port:49782
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349762317892816766 05/10/22-11:53:59.504378
        SID:2816766
        Source Port:49762
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349771317892816766 05/10/22-11:54:13.062923
        SID:2816766
        Source Port:49771
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349837317892816766 05/10/22-11:54:49.300837
        SID:2816766
        Source Port:49837
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349816317892816766 05/10/22-11:54:33.736622
        SID:2816766
        Source Port:49816
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349816317892025019 05/10/22-11:54:32.532276
        SID:2025019
        Source Port:49816
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349869317892025019 05/10/22-11:55:20.675127
        SID:2025019
        Source Port:49869
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:185.140.53.3192.168.2.331789498642841753 05/10/22-11:55:01.918437
        SID:2841753
        Source Port:31789
        Destination Port:49864
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349752317892816766 05/10/22-11:53:47.498984
        SID:2816766
        Source Port:49752
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:185.140.53.3192.168.2.331789498692810451 05/10/22-11:55:45.875144
        SID:2810451
        Source Port:31789
        Destination Port:49869
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349867317892025019 05/10/22-11:55:06.652869
        SID:2025019
        Source Port:49867
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349868317892025019 05/10/22-11:55:14.375651
        SID:2025019
        Source Port:49868
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349767317892816766 05/10/22-11:54:06.037273
        SID:2816766
        Source Port:49767
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349778317892816766 05/10/22-11:54:20.124819
        SID:2816766
        Source Port:49778
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:185.140.53.3192.168.2.331789498692841753 05/10/22-11:55:45.875144
        SID:2841753
        Source Port:31789
        Destination Port:49869
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:185.140.53.3192.168.2.331789498692810290 05/10/22-11:55:23.881709
        SID:2810290
        Source Port:31789
        Destination Port:49869
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349826317892025019 05/10/22-11:54:39.732514
        SID:2025019
        Source Port:49826
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349837317892025019 05/10/22-11:54:47.544258
        SID:2025019
        Source Port:49837
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349771317892816718 05/10/22-11:54:13.062923
        SID:2816718
        Source Port:49771
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349864317892025019 05/10/22-11:55:01.707210
        SID:2025019
        Source Port:49864
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:185.140.53.3192.168.2.331789497582841753 05/10/22-11:53:53.093006
        SID:2841753
        Source Port:31789
        Destination Port:49758
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349843317892025019 05/10/22-11:54:54.648860
        SID:2025019
        Source Port:49843
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.3185.140.53.349868317892816718 05/10/22-11:55:15.380950
        SID:2816718
        Source Port:49868
        Destination Port:31789
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "a63bf89b-7de8-4696-9653-4f27004d", "Group": "APRILO", "Domain1": "ella666.duckdns.org", "Domain2": "mikeljack321.ddns.net", "Port": 31789, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "ella666.duckdns.org"}
        Source: e1f388b8a086e034b1fbd94ca7341008.exeVirustotal: Detection: 21%Perma Link
        Source: e1f388b8a086e034b1fbd94ca7341008.exeReversingLabs: Detection: 24%
        Source: ella666.duckdns.orgAvira URL Cloud: Label: malware
        Source: ella666.duckdns.orgVirustotal: Detection: 11%Perma Link
        Source: ella666.duckdns.orgVirustotal: Detection: 11%Perma Link
        Source: mikeljack321.ddns.netVirustotal: Detection: 6%Perma Link
        Source: C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exeVirustotal: Detection: 24%Perma Link
        Source: C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exeReversingLabs: Detection: 24%
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f4629.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d8d081.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 6952, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 3312, type: MEMORYSTR
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpackAvira: Label: TR/NanoCore.fadte
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking

        barindex
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49750 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49750 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49752 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49752 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49758 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 185.140.53.3:31789 -> 192.168.2.3:49758
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49762 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49762 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49767 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49767 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49771 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49771 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49771 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49778 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49778 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49782 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49782 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49816 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49816 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49826 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49826 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49837 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49837 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49843 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49843 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49864 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 185.140.53.3:31789 -> 192.168.2.3:49864
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49867 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49867 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49868 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49868 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49868 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49869 -> 185.140.53.3:31789
        Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 185.140.53.3:31789 -> 192.168.2.3:49869
        Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 185.140.53.3:31789 -> 192.168.2.3:49869
        Source: TrafficSnort IDS: 2810451 ETPRO TROJAN NanoCore RAT Keepalive Response 3 185.140.53.3:31789 -> 192.168.2.3:49869
        Source: global trafficTCP traffic: 185.140.53.3 ports 1,3,7,8,9,31789
        Source: Malware configuration extractorURLs: ella666.duckdns.org
        Source: Malware configuration extractorURLs: mikeljack321.ddns.net
        Source: unknownDNS query: name: ella666.duckdns.org
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: Joe Sandbox ViewIP Address: 185.140.53.3 185.140.53.3
        Source: global trafficTCP traffic: 192.168.2.3:49750 -> 185.140.53.3:31789
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.292920833.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.292557381.0000000001457000.00000004.00000020.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: unknownDNS traffic detected: queries for: ella666.duckdns.org
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.292274992.0000000000F8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f4629.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d8d081.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 6952, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 3312, type: MEMORYSTR

        System Summary

        barindex
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.5540000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.5540000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f4629.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f4629.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d8d081.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d8d081.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.2d53434.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.2d53434.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.520324734.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.520324734.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 6952, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 6952, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 3312, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 3312, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.5540000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.5540000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.5540000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f4629.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f4629.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f4629.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d8d081.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d8d081.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d8d081.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.2d53434.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.2d53434.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.2d53434.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.520324734.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.520324734.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.520324734.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 6952, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 6952, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 3312, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 3312, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 0_2_00F7DA7C
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_0135E471
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_0135E480
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_0135BBD4
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_052F6550
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_052F3E30
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_052FBED8
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_052F4A50
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_052FCAF0
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_052F4B08
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_052FCBAE
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.292274992.0000000000F8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.298171990.0000000007200000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFort.dll" vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000000.249490438.0000000000879000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMRMWrapperDiction.exeD vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.298689123.0000000007560000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000003.271361239.0000000003CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000000.289696149.0000000000959000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMRMWrapperDiction.exeD vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.520718164.0000000006240000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exeBinary or memory string: OriginalFilenameMRMWrapperDiction.exeD vs e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: QgGSCvPvvCY.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: QgGSCvPvvCY.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: e1f388b8a086e034b1fbd94ca7341008.exeVirustotal: Detection: 21%
        Source: e1f388b8a086e034b1fbd94ca7341008.exeReversingLabs: Detection: 24%
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeFile read: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeJump to behavior
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe "C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe"
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgGSCvPvvCY" /XML "C:\Users\user\AppData\Local\Temp\tmp5BA5.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgGSCvPvvCY" /XML "C:\Users\user\AppData\Local\Temp\tmp5BA5.tmp
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeFile created: C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exeJump to behavior
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5BA5.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@9/10@16/1
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.291615894.0000000000762000.00000002.00000001.01000000.00000003.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.516267895.0000000000842000.00000002.00000001.01000000.00000003.sdmp, QgGSCvPvvCY.exe.0.drBinary or memory string: SELECT TOP 1 FirstDate FROM OrderData WHERE `Order`="{0}" ORDER BY FirstDate ASCmUPDATE OrderData SET PINCode="{1}" WHERE PINCode="{0}"ACREATE DATABASE `{0}`; USE `{0}`
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6292:120:WilError_01
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeMutant created: \Sessions\1\BaseNamedObjects\mTIuZNSEEWwFTIE
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5144:120:WilError_01
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{a63bf89b-7de8-4696-9653-4f27004da8e8}
        Source: e1f388b8a086e034b1fbd94ca7341008.exeString found in binary or memory: user-add
        Source: e1f388b8a086e034b1fbd94ca7341008.exeString found in binary or memory: note-add
        Source: e1f388b8a086e034b1fbd94ca7341008.exeString found in binary or memory: <!--StartFragment -->
        Source: e1f388b8a086e034b1fbd94ca7341008.exeString found in binary or memory: user-add
        Source: e1f388b8a086e034b1fbd94ca7341008.exeString found in binary or memory: note-add
        Source: e1f388b8a086e034b1fbd94ca7341008.exeString found in binary or memory: <!--StartFragment -->
        Source: e1f388b8a086e034b1fbd94ca7341008.exeString found in binary or memory: user-add
        Source: e1f388b8a086e034b1fbd94ca7341008.exeString found in binary or memory: note-add
        Source: e1f388b8a086e034b1fbd94ca7341008.exeString found in binary or memory: <<<<<<<3+<!--StartFragment -->
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic file information: File size 1159168 > 1048576
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x105400
        Source: e1f388b8a086e034b1fbd94ca7341008.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation

        barindex
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: QgGSCvPvvCY.exe.0.dr, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 0.0.e1f388b8a086e034b1fbd94ca7341008.exe.760000.0.unpack, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.760000.0.unpack, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.840000.7.unpack, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.840000.1.unpack, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.840000.5.unpack, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeCode function: 8_2_052F6ED9 push ebx; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.15323039057
        Source: initial sampleStatic PE information: section name: .text entropy: 7.15323039057
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeFile created: C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgGSCvPvvCY" /XML "C:\Users\user\AppData\Local\Temp\tmp5BA5.tmp

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeFile opened: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 00000000.00000002.293486073.0000000002DEB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.292920833.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 6952, type: MEMORYSTR
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.292920833.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.293486073.0000000002DEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.292920833.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.293486073.0000000002DEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe TID: 6956Thread sleep time: -45733s >= -30000s
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe TID: 6972Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5208Thread sleep time: -7378697629483816s >= -30000s
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe TID: 6468Thread sleep time: -22136092888451448s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6354
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2230
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeWindow / User API: threadDelayed 3421
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeWindow / User API: threadDelayed 6134
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeWindow / User API: foregroundWindowGot 959
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeThread delayed: delay time: 45733
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeThread delayed: delay time: 922337203685477
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.293486073.0000000002DEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.293486073.0000000002DEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.293486073.0000000002DEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.293486073.0000000002DEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: QgGSCvPvvCY.exe.0.dr, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: 0.0.e1f388b8a086e034b1fbd94ca7341008.exe.760000.0.unpack, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.760000.0.unpack, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.840000.7.unpack, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.840000.1.unpack, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.840000.5.unpack, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeMemory written: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgGSCvPvvCY" /XML "C:\Users\user\AppData\Local\Temp\tmp5BA5.tmp
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeProcess created: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.520552219.0000000005E0B000.00000004.00000010.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.518945075.00000000031A9000.00000004.00000800.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.518869130.000000000318A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.521216534.0000000006D6D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager 4L
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.518072313.0000000002D93000.00000004.00000800.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.518750362.000000000313C000.00000004.00000800.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.519004492.00000000031C3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f4629.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d8d081.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 6952, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 3312, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f4629.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d8d081.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.3d88a58.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3ddf780.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e4ffc0.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.e1f388b8a086e034b1fbd94ca7341008.exe.3e1d5a0.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 6952, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: e1f388b8a086e034b1fbd94ca7341008.exe PID: 3312, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts2
        Command and Scripting Interpreter
        1
        Scheduled Task/Job
        112
        Process Injection
        1
        Masquerading
        21
        Input Capture
        21
        Security Software Discovery
        Remote Services21
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default Accounts1
        Scheduled Task/Job
        Boot or Logon Initialization Scripts1
        Scheduled Task/Job
        11
        Disable or Modify Tools
        LSASS Memory2
        Process Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain Accounts1
        Native API
        Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
        Process Injection
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets1
        File and Directory Discovery
        SSHKeyloggingData Transfer Size Limits21
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Hidden Files and Directories
        Cached Domain Credentials12
        System Information Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items2
        Obfuscated Files or Information
        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
        Software Packing
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        e1f388b8a086e034b1fbd94ca7341008.exe22%VirustotalBrowse
        e1f388b8a086e034b1fbd94ca7341008.exe24%ReversingLabsByteCode-MSIL.Trojan.Taskun
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe25%VirustotalBrowse
        C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe24%ReversingLabsByteCode-MSIL.Trojan.Taskun
        SourceDetectionScannerLabelLinkDownload
        8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.2.e1f388b8a086e034b1fbd94ca7341008.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.2.e1f388b8a086e034b1fbd94ca7341008.exe.57f0000.7.unpack100%AviraTR/NanoCore.fadteDownload File
        8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.0.e1f388b8a086e034b1fbd94ca7341008.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        SourceDetectionScannerLabelLink
        ella666.duckdns.org12%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        ella666.duckdns.org12%VirustotalBrowse
        ella666.duckdns.org100%Avira URL Cloudmalware
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        mikeljack321.ddns.net7%VirustotalBrowse
        mikeljack321.ddns.net0%Avira URL Cloudsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        ella666.duckdns.org
        185.140.53.3
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        ella666.duckdns.orgtrue
        • 12%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        mikeljack321.ddns.nettrue
        • 7%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.apache.org/licenses/LICENSE-2.0e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.come1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.292557381.0000000001457000.00000004.00000020.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.com/designersGe1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designers/?e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.founder.com.cn/cn/bThee1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers?e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.tiro.come1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designerse1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.goodfont.co.kre1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comle1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.come1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDe1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNe1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/cThee1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htme1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.come1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cne1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-jones.htmle1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleasee1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8e1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fonts.come1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sandoll.co.kre1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleasee1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cne1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namee1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.292920833.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, e1f388b8a086e034b1fbd94ca7341008.exe, 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sakkal.come1f388b8a086e034b1fbd94ca7341008.exe, 00000000.00000002.297515280.0000000006D12000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              185.140.53.3
                              ella666.duckdns.orgSweden
                              209623DAVID_CRAIGGGtrue
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:623326
                              Start date and time: 10/05/202211:52:102022-05-10 11:52:10 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 10m 34s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:e1f388b8a086e034b1fbd94ca7341008.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:30
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@9/10@16/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Adjust boot time
                              • Enable AMSI
                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                              • TCP Packets have been reduced to 100
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              11:53:22API Interceptor865x Sleep call for process: e1f388b8a086e034b1fbd94ca7341008.exe modified
                              11:53:29API Interceptor35x Sleep call for process: powershell.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):1308
                              Entropy (8bit):5.345811588615766
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):22240
                              Entropy (8bit):5.601926797997156
                              Encrypted:false
                              SSDEEP:384:4jtCDLq0hX3AcoATY4KnwjultIt27Y9gNSJ3xWT1MaLZlbAV7ia23ZBDI+iaE:44X3474KwCltSyNckCafwQVU
                              MD5:07C4587984660ADA43BA12DE61D64EEF
                              SHA1:897D5E48E0516C17830E2C09ED3A8F5FCA5FE5E6
                              SHA-256:4BCFB8127C63B308F026A42EB8795AAFE832FD05B65E3288E23BB8A7940BE95B
                              SHA-512:BF4A65E900E7201916391CE8F0C620EC296A42D59F38EB6BBC4D5D5361BE4B17FF9E79B223CA4B2C086157C07D32814C17880358FC3FBD4D9D44FCA5B8BD684F
                              Malicious:false
                              Reputation:low
                              Preview:@...e...........p.......h...W.N.K.....y...H..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:very short file (no magic)
                              Category:dropped
                              Size (bytes):1
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3:U:U
                              MD5:C4CA4238A0B923820DCC509A6F75849B
                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:1
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:very short file (no magic)
                              Category:dropped
                              Size (bytes):1
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3:U:U
                              MD5:C4CA4238A0B923820DCC509A6F75849B
                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:1
                              Process:C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
                              File Type:XML 1.0 document, ASCII text
                              Category:dropped
                              Size (bytes):1598
                              Entropy (8bit):5.158943217736509
                              Encrypted:false
                              SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNttXxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTrv
                              MD5:75F7A3F0883E114F65B5970F1FCD4CF2
                              SHA1:24DF87D295A023E8F73C69E312DBB504288BD914
                              SHA-256:8A965519AAF417D139A3F1E5D44129DF65CACA48A9E1C174CA6F3026CD9B40D0
                              SHA-512:8EA192A569456D1CB1102BB9AF9D13CC4CB1E81317A55C110CC66A5106D29F255916112F89131621AEA22824D8FE5F1F11B7D51472F180D21E8A7A265C470546
                              Malicious:true
                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                              Process:C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):232
                              Entropy (8bit):7.024371743172393
                              Encrypted:false
                              SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                              MD5:32D0AAE13696FF7F8AF33B2D22451028
                              SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                              SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                              SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                              Malicious:false
                              Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                              Process:C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8
                              Entropy (8bit):3.0
                              Encrypted:false
                              SSDEEP:3:mln:ml
                              MD5:E578BDC4870935A8ED87C86290D526C2
                              SHA1:A238F1F66DDEB7F15E3438B2020D9699B236907D
                              SHA-256:73DC67D9CA00AFEC69D033CA24EAC73F73F4EA97B678794A91A1F970EFADC81B
                              SHA-512:8BAB6343B110F99E148426F23B0D9CD17E2257BD1042F445FC5A0F1D256AC3B32DB44EDAC364E9F53E12B5DA72D16E3265B5C25B8FC253E7185B20990E537793
                              Malicious:true
                              Preview:...c.2.H
                              Process:C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):1159168
                              Entropy (8bit):7.014675929913691
                              Encrypted:false
                              SSDEEP:12288:zzODfxt7J0n9QnXZObXEbA3OBGr0IUfV4p4ifhTdVx5tLaN6lZFm+t5rCQJG/kez:3E2n9QXZOkAeUFUSnRz5tm6bFme2
                              MD5:916EB825989BC96A10EAB8916995C1E1
                              SHA1:E91E3A11AB3203C912B5D756C5F22E620760EDF9
                              SHA-256:6E5CE2C28B65E3F50C89EE799DE9C047C07EC4C27B4D4B8B6F4F202B1E8D557A
                              SHA-512:E3AED0247856EC0D976032467921989708FC9F8A64580444788A6C9871C092C6C28D440E5D77DFAD7B1DFC84835D681959173C3A291100D167EC713075A5E381
                              Malicious:true
                              Antivirus:
                              • Antivirus: Virustotal, Detection: 25%, Browse
                              • Antivirus: ReversingLabs, Detection: 24%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../.zb..............0..T...Z.......r... ........@.. ....................................@..................................r..O........W........................................................................... ............... ..H............text....R... ...T.................. ..`.rsrc....W.......X...V..............@..@.reloc..............................@..B.................r......H.......h...$...........................................................-. .:....*..{)...*..{*...*V.(+.....}).....}*...*. .... )UU.Z(,....{)...o0...X )UU.Z(.....{*...o1...X*&...(4...*B.(........}....*^..}.....(5......(.....*&..(.....*>...(....(.....*..(B...*..oC...*..oD...*..o....*..o....*..oE...*.sF...*.sG...*.sH...*.sI...*.sJ...*..oK...*..(K...*..oL...*"..oM...*"..oN...*"..oO...*"..oP...*"..oQ...*"..oR...*"..oS...*"..oT...*"..oU...*"..oV...*"..oW...*"..oX...*"..oY...*"..oZ.
                              Process:C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:false
                              Preview:[ZoneTransfer]....ZoneId=0
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5793
                              Entropy (8bit):5.423338801980799
                              Encrypted:false
                              SSDEEP:96:BZWhUN7qDo1ZRZbuhUN7qDo1Zja0yjZihUN7qDo1ZczCCajZ8a:O
                              MD5:229A9A51D89E599FC053B83B450DBF0F
                              SHA1:855A0E98DBB6EA5C17C1332D6DA6AD729F0CE5E1
                              SHA-256:558143EEDE6ED094BEDC9268C81C9506EEE016326E7175DDE197915EEAB2127E
                              SHA-512:426CE8347969D30A990F062251CAC8311CC5407EAE6DDF8C8E19B27F83E8E0F783F27F32AA625EA5DFB80C850EAF67330E9F14A3D35C8516833752B31A4DE1D6
                              Malicious:false
                              Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510115328..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 284992 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe..Process ID: 5508..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510115328..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe..**********************..Windows PowerShell transcript start..Start time: 20220510115647..Username: computer\user..RunAs User: computer\ha
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.014675929913691
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:e1f388b8a086e034b1fbd94ca7341008.exe
                              File size:1159168
                              MD5:916eb825989bc96a10eab8916995c1e1
                              SHA1:e91e3a11ab3203c912b5d756c5f22e620760edf9
                              SHA256:6e5ce2c28b65e3f50c89ee799de9c047c07ec4c27b4d4b8b6f4f202b1e8d557a
                              SHA512:e3aed0247856ec0d976032467921989708fc9f8a64580444788a6c9871c092c6c28d440e5d77dfad7b1dfc84835d681959173c3a291100d167ec713075a5e381
                              SSDEEP:12288:zzODfxt7J0n9QnXZObXEbA3OBGr0IUfV4p4ifhTdVx5tLaN6lZFm+t5rCQJG/kez:3E2n9QXZOkAeUFUSnRz5tm6bFme2
                              TLSH:5A3528987254F9DEC85BD071CA685CF0AA207C6AC31B820B50173D9EB97DB83DF215A7
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../.zb..............0..T...Z.......r... ........@.. ....................................@................................
                              Icon Hash:f274fec6b6c2e00c
                              Entrypoint:0x5072de
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x627A172F [Tue May 10 07:41:35 2022 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x10728c0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1080000x15708.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x11e0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x1052e40x105400False0.644225665371data7.15323039057IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x1080000x157080x15800False0.151560228924data4.00261840431IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x11e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x1081d80x8a8data
                              RT_ICON0x108a800x568GLS_BINARY_LSB_FIRST
                              RT_ICON0x108fe80x10828data
                              RT_ICON0x1198100x25a8data
                              RT_ICON0x11bdb80x10a8data
                              RT_ICON0x11ce600x468GLS_BINARY_LSB_FIRST
                              RT_GROUP_ICON0x11d2c80x5adata
                              RT_VERSION0x11d3240x3e4data
                              DLLImport
                              mscoree.dll_CorExeMain
                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright 2011 BASeCamp Software Solutions
                              Assembly Version1.4.8.0
                              InternalNameMRMWrapperDiction.exe
                              FileVersion1.4.8.0
                              CompanyNameBASeCamp Software Solutions
                              LegalTrademarks
                              Comments
                              ProductNameBASeCamp JobClock
                              ProductVersion1.4.8.0
                              FileDescriptionJobClock Administration Applet
                              OriginalFilenameMRMWrapperDiction.exe
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              192.168.2.3185.140.53.349767317892025019 05/10/22-11:54:04.775428TCP2025019ET TROJAN Possible NanoCore C2 60B4976731789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349778317892025019 05/10/22-11:54:18.335094TCP2025019ET TROJAN Possible NanoCore C2 60B4977831789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349826317892816766 05/10/22-11:54:42.317503TCP2816766ETPRO TROJAN NanoCore RAT CnC 74982631789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349867317892816766 05/10/22-11:55:08.482183TCP2816766ETPRO TROJAN NanoCore RAT CnC 74986731789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349868317892816766 05/10/22-11:55:15.380950TCP2816766ETPRO TROJAN NanoCore RAT CnC 74986831789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349843317892816766 05/10/22-11:54:56.333885TCP2816766ETPRO TROJAN NanoCore RAT CnC 74984331789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349762317892025019 05/10/22-11:53:57.886255TCP2025019ET TROJAN Possible NanoCore C2 60B4976231789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349758317892025019 05/10/22-11:53:52.880985TCP2025019ET TROJAN Possible NanoCore C2 60B4975831789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349782317892025019 05/10/22-11:54:25.487213TCP2025019ET TROJAN Possible NanoCore C2 60B4978231789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349771317892025019 05/10/22-11:54:11.319386TCP2025019ET TROJAN Possible NanoCore C2 60B4977131789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349750317892025019 05/10/22-11:53:37.365565TCP2025019ET TROJAN Possible NanoCore C2 60B4975031789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349752317892025019 05/10/22-11:53:45.193397TCP2025019ET TROJAN Possible NanoCore C2 60B4975231789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349750317892816766 05/10/22-11:53:38.950679TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975031789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349782317892816766 05/10/22-11:54:26.713499TCP2816766ETPRO TROJAN NanoCore RAT CnC 74978231789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349762317892816766 05/10/22-11:53:59.504378TCP2816766ETPRO TROJAN NanoCore RAT CnC 74976231789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349771317892816766 05/10/22-11:54:13.062923TCP2816766ETPRO TROJAN NanoCore RAT CnC 74977131789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349837317892816766 05/10/22-11:54:49.300837TCP2816766ETPRO TROJAN NanoCore RAT CnC 74983731789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349816317892816766 05/10/22-11:54:33.736622TCP2816766ETPRO TROJAN NanoCore RAT CnC 74981631789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349816317892025019 05/10/22-11:54:32.532276TCP2025019ET TROJAN Possible NanoCore C2 60B4981631789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349869317892025019 05/10/22-11:55:20.675127TCP2025019ET TROJAN Possible NanoCore C2 60B4986931789192.168.2.3185.140.53.3
                              185.140.53.3192.168.2.331789498642841753 05/10/22-11:55:01.918437TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)3178949864185.140.53.3192.168.2.3
                              192.168.2.3185.140.53.349752317892816766 05/10/22-11:53:47.498984TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975231789192.168.2.3185.140.53.3
                              185.140.53.3192.168.2.331789498692810451 05/10/22-11:55:45.875144TCP2810451ETPRO TROJAN NanoCore RAT Keepalive Response 33178949869185.140.53.3192.168.2.3
                              192.168.2.3185.140.53.349867317892025019 05/10/22-11:55:06.652869TCP2025019ET TROJAN Possible NanoCore C2 60B4986731789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349868317892025019 05/10/22-11:55:14.375651TCP2025019ET TROJAN Possible NanoCore C2 60B4986831789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349767317892816766 05/10/22-11:54:06.037273TCP2816766ETPRO TROJAN NanoCore RAT CnC 74976731789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349778317892816766 05/10/22-11:54:20.124819TCP2816766ETPRO TROJAN NanoCore RAT CnC 74977831789192.168.2.3185.140.53.3
                              185.140.53.3192.168.2.331789498692841753 05/10/22-11:55:45.875144TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)3178949869185.140.53.3192.168.2.3
                              185.140.53.3192.168.2.331789498692810290 05/10/22-11:55:23.881709TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 13178949869185.140.53.3192.168.2.3
                              192.168.2.3185.140.53.349826317892025019 05/10/22-11:54:39.732514TCP2025019ET TROJAN Possible NanoCore C2 60B4982631789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349837317892025019 05/10/22-11:54:47.544258TCP2025019ET TROJAN Possible NanoCore C2 60B4983731789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349771317892816718 05/10/22-11:54:13.062923TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4977131789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349864317892025019 05/10/22-11:55:01.707210TCP2025019ET TROJAN Possible NanoCore C2 60B4986431789192.168.2.3185.140.53.3
                              185.140.53.3192.168.2.331789497582841753 05/10/22-11:53:53.093006TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)3178949758185.140.53.3192.168.2.3
                              192.168.2.3185.140.53.349843317892025019 05/10/22-11:54:54.648860TCP2025019ET TROJAN Possible NanoCore C2 60B4984331789192.168.2.3185.140.53.3
                              192.168.2.3185.140.53.349868317892816718 05/10/22-11:55:15.380950TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4986831789192.168.2.3185.140.53.3
                              TimestampSource PortDest PortSource IPDest IP
                              May 10, 2022 11:53:37.110084057 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:37.303845882 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:37.304080009 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:37.365565062 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:37.653333902 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:37.668632984 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:37.879831076 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:37.939357996 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:38.355535984 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:38.355720043 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:38.605391979 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:38.605454922 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:38.605638981 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:38.805238008 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:38.805272102 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:38.805288076 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:38.805382967 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:38.807291031 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:38.809726000 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:38.950679064 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.014911890 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.014954090 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.014977932 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.015104055 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.015157938 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.016700983 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.017688036 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.017786980 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.017833948 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.017862082 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.021110058 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.021997929 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.022931099 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.023113966 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.211493015 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.212590933 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.212636948 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.212661982 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.215523958 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.215563059 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.215579033 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.215610981 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.215642929 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.217804909 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.219566107 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.219583988 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.219633102 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.221483946 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.221529007 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.221549034 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.222563028 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.222616911 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.226156950 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.226175070 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.226191044 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.226237059 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.227515936 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.227587938 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.414208889 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.414334059 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.414391041 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.415216923 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.415285110 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.415319920 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.415322065 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.415399075 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.415435076 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.417263031 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.417573929 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.417612076 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.417612076 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.419213057 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.419253111 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.419264078 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.420223951 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.420264006 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.420334101 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.421292067 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.421333075 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.421366930 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.422338009 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.422455072 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.422480106 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.433501959 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.433630943 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.433648109 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.433720112 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.433741093 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.435477972 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.435518026 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.435544968 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.436760902 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.436780930 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.436810970 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.436851025 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.436868906 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.436888933 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.438604116 CEST3178949750185.140.53.3192.168.2.3
                              May 10, 2022 11:53:39.438669920 CEST4975031789192.168.2.3185.140.53.3
                              May 10, 2022 11:53:39.438672066 CEST3178949750185.140.53.3192.168.2.3
                              TimestampSource PortDest PortSource IPDest IP
                              May 10, 2022 11:53:36.991666079 CEST5811653192.168.2.38.8.8.8
                              May 10, 2022 11:53:37.100851059 CEST53581168.8.8.8192.168.2.3
                              May 10, 2022 11:53:44.852917910 CEST6535853192.168.2.38.8.8.8
                              May 10, 2022 11:53:44.961446047 CEST53653588.8.8.8192.168.2.3
                              May 10, 2022 11:53:52.551485062 CEST5380253192.168.2.38.8.8.8
                              May 10, 2022 11:53:52.658183098 CEST53538028.8.8.8192.168.2.3
                              May 10, 2022 11:53:57.567101002 CEST4932753192.168.2.38.8.8.8
                              May 10, 2022 11:53:57.677052021 CEST53493278.8.8.8192.168.2.3
                              May 10, 2022 11:54:04.547096014 CEST6314653192.168.2.38.8.8.8
                              May 10, 2022 11:54:04.564308882 CEST53631468.8.8.8192.168.2.3
                              May 10, 2022 11:54:11.105657101 CEST5862553192.168.2.38.8.8.8
                              May 10, 2022 11:54:11.122956991 CEST53586258.8.8.8192.168.2.3
                              May 10, 2022 11:54:18.103682995 CEST5515153192.168.2.38.8.8.8
                              May 10, 2022 11:54:18.123296022 CEST53551518.8.8.8192.168.2.3
                              May 10, 2022 11:54:25.232455015 CEST6499653192.168.2.38.8.8.8
                              May 10, 2022 11:54:25.250078917 CEST53649968.8.8.8192.168.2.3
                              May 10, 2022 11:54:32.229193926 CEST5045053192.168.2.38.8.8.8
                              May 10, 2022 11:54:32.337620974 CEST53504508.8.8.8192.168.2.3
                              May 10, 2022 11:54:39.297074080 CEST5060853192.168.2.38.8.8.8
                              May 10, 2022 11:54:39.405493975 CEST53506088.8.8.8192.168.2.3
                              May 10, 2022 11:54:47.325944901 CEST5409653192.168.2.38.8.8.8
                              May 10, 2022 11:54:47.343204021 CEST53540968.8.8.8192.168.2.3
                              May 10, 2022 11:54:54.328751087 CEST5782953192.168.2.38.8.8.8
                              May 10, 2022 11:54:54.437845945 CEST53578298.8.8.8192.168.2.3
                              May 10, 2022 11:55:01.386909962 CEST6332653192.168.2.38.8.8.8
                              May 10, 2022 11:55:01.495198011 CEST53633268.8.8.8192.168.2.3
                              May 10, 2022 11:55:06.434148073 CEST5744253192.168.2.38.8.8.8
                              May 10, 2022 11:55:06.453212023 CEST53574428.8.8.8192.168.2.3
                              May 10, 2022 11:55:13.546652079 CEST5155753192.168.2.38.8.8.8
                              May 10, 2022 11:55:13.654952049 CEST53515578.8.8.8192.168.2.3
                              May 10, 2022 11:55:20.432488918 CEST6533453192.168.2.38.8.8.8
                              May 10, 2022 11:55:20.449237108 CEST53653348.8.8.8192.168.2.3
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              May 10, 2022 11:53:36.991666079 CEST192.168.2.38.8.8.80x5c6Standard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:53:44.852917910 CEST192.168.2.38.8.8.80x8e0fStandard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:53:52.551485062 CEST192.168.2.38.8.8.80xa59fStandard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:53:57.567101002 CEST192.168.2.38.8.8.80xd93aStandard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:54:04.547096014 CEST192.168.2.38.8.8.80xa2ccStandard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:54:11.105657101 CEST192.168.2.38.8.8.80x945fStandard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:54:18.103682995 CEST192.168.2.38.8.8.80xc9eStandard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:54:25.232455015 CEST192.168.2.38.8.8.80x9285Standard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:54:32.229193926 CEST192.168.2.38.8.8.80xe093Standard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:54:39.297074080 CEST192.168.2.38.8.8.80x1de0Standard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:54:47.325944901 CEST192.168.2.38.8.8.80x4064Standard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:54:54.328751087 CEST192.168.2.38.8.8.80x7337Standard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:55:01.386909962 CEST192.168.2.38.8.8.80x3081Standard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:55:06.434148073 CEST192.168.2.38.8.8.80xf36dStandard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:55:13.546652079 CEST192.168.2.38.8.8.80x5962Standard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              May 10, 2022 11:55:20.432488918 CEST192.168.2.38.8.8.80xc1a8Standard query (0)ella666.duckdns.orgA (IP address)IN (0x0001)
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              May 10, 2022 11:53:37.100851059 CEST8.8.8.8192.168.2.30x5c6No error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:53:44.961446047 CEST8.8.8.8192.168.2.30x8e0fNo error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:53:52.658183098 CEST8.8.8.8192.168.2.30xa59fNo error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:53:57.677052021 CEST8.8.8.8192.168.2.30xd93aNo error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:54:04.564308882 CEST8.8.8.8192.168.2.30xa2ccNo error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:54:11.122956991 CEST8.8.8.8192.168.2.30x945fNo error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:54:18.123296022 CEST8.8.8.8192.168.2.30xc9eNo error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:54:25.250078917 CEST8.8.8.8192.168.2.30x9285No error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:54:32.337620974 CEST8.8.8.8192.168.2.30xe093No error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:54:39.405493975 CEST8.8.8.8192.168.2.30x1de0No error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:54:47.343204021 CEST8.8.8.8192.168.2.30x4064No error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:54:54.437845945 CEST8.8.8.8192.168.2.30x7337No error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:55:01.495198011 CEST8.8.8.8192.168.2.30x3081No error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:55:06.453212023 CEST8.8.8.8192.168.2.30xf36dNo error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:55:13.654952049 CEST8.8.8.8192.168.2.30x5962No error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)
                              May 10, 2022 11:55:20.449237108 CEST8.8.8.8192.168.2.30xc1a8No error (0)ella666.duckdns.org185.140.53.3A (IP address)IN (0x0001)

                              Click to jump to process

                              Target ID:0
                              Start time:11:53:14
                              Start date:10/05/2022
                              Path:C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe"
                              Imagebase:0x760000
                              File size:1159168 bytes
                              MD5 hash:916EB825989BC96A10EAB8916995C1E1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.293486073.0000000002DEB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.292920833.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.294855459.0000000003DDF000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              Target ID:4
                              Start time:11:53:26
                              Start date:10/05/2022
                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QgGSCvPvvCY.exe
                              Imagebase:0x870000
                              File size:430592 bytes
                              MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:high

                              Target ID:5
                              Start time:11:53:26
                              Start date:10/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7c9170000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:6
                              Start time:11:53:26
                              Start date:10/05/2022
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QgGSCvPvvCY" /XML "C:\Users\user\AppData\Local\Temp\tmp5BA5.tmp
                              Imagebase:0x9b0000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:7
                              Start time:11:53:27
                              Start date:10/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7c9170000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:8
                              Start time:11:53:29
                              Start date:10/05/2022
                              Path:C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\e1f388b8a086e034b1fbd94ca7341008.exe
                              Imagebase:0x840000
                              File size:1159168 bytes
                              MD5 hash:916EB825989BC96A10EAB8916995C1E1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.519250618.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.515876792.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.288319319.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.289425663.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.520324734.0000000005540000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.520324734.0000000005540000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.520324734.0000000005540000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.286410609.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.288866971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.520506917.00000000057F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.518021079.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              No disassembly