Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qs5yhVj1bE.exe

Overview

General Information

Sample Name:qs5yhVj1bE.exe
Analysis ID:623785
MD5:fc38c021fb2a8c4d49b9f3e3fd91b03b
SHA1:f790e60e1a48a0faf5c311ee8c882f6d08653490
SHA256:af66baeaeaf66b03d22bfba26cfaff343489fdf3eccb9e6078017c93fd6155c5
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • qs5yhVj1bE.exe (PID: 6204 cmdline: "C:\Users\user\Desktop\qs5yhVj1bE.exe" MD5: FC38C021FB2A8C4D49B9F3E3FD91B03B)
    • powershell.exe (PID: 6664 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5580 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • qs5yhVj1bE.exe (PID: 4128 cmdline: C:\Users\user\Desktop\qs5yhVj1bE.exe MD5: FC38C021FB2A8C4D49B9F3E3FD91B03B)
    • qs5yhVj1bE.exe (PID: 6464 cmdline: C:\Users\user\Desktop\qs5yhVj1bE.exe MD5: FC38C021FB2A8C4D49B9F3E3FD91B03B)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "6d38b3f5-33a1-41b7-a7f2-d8fe2b39", "Group": "happy man", "Domain1": "91.193.75.221", "Domain2": "", "Port": 4040, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 31 entries
        SourceRuleDescriptionAuthorStrings
        13.2.qs5yhVj1bE.exe.4064545.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0x23c28:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        • 0x23c55:$x2: IClientNetworkHost
        13.2.qs5yhVj1bE.exe.4064545.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xb184:$x2: NanoCore.ClientPluginHost
        • 0x23c28:$x2: NanoCore.ClientPluginHost
        • 0xc25f:$s4: PipeCreated
        • 0x24d03:$s4: PipeCreated
        • 0xb19e:$s5: IClientLoggingHost
        • 0x23c42:$s5: IClientLoggingHost
        13.2.qs5yhVj1bE.exe.4064545.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          13.2.qs5yhVj1bE.exe.4064545.4.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
          • 0xb14f:$x2: NanoCore.ClientPlugin
          • 0x23bf3:$x2: NanoCore.ClientPlugin
          • 0xb184:$x3: NanoCore.ClientPluginHost
          • 0x23c28:$x3: NanoCore.ClientPluginHost
          • 0xb143:$i2: IClientData
          • 0x23be7:$i2: IClientData
          • 0xb165:$i3: IClientNetwork
          • 0x23c09:$i3: IClientNetwork
          • 0xb174:$i5: IClientDataHost
          • 0x23c18:$i5: IClientDataHost
          • 0xb19e:$i6: IClientLoggingHost
          • 0x23c42:$i6: IClientLoggingHost
          • 0xb1b1:$i7: IClientNetworkHost
          • 0x23c55:$i7: IClientNetworkHost
          • 0xb1c4:$i8: IClientUIHost
          • 0x23c68:$i8: IClientUIHost
          • 0xb1d2:$i9: IClientNameObjectCollection
          • 0x23c76:$i9: IClientNameObjectCollection
          • 0xb1ee:$i10: IClientReadOnlyNameObjectCollection
          • 0x23c92:$i10: IClientReadOnlyNameObjectCollection
          • 0xaf41:$s1: ClientPlugin
          13.2.qs5yhVj1bE.exe.6280000.9.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xd9ad:$x1: NanoCore.ClientPluginHost
          • 0xd9da:$x2: IClientNetworkHost
          Click to see the 83 entries

          AV Detection

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\qs5yhVj1bE.exe, ProcessId: 6464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\qs5yhVj1bE.exe, ProcessId: 6464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Stealing of Sensitive Information

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\qs5yhVj1bE.exe, ProcessId: 6464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\qs5yhVj1bE.exe, ProcessId: 6464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6d38b3f5-33a1-41b7-a7f2-d8fe2b39", "Group": "happy man", "Domain1": "91.193.75.221", "Domain2": "", "Port": 4040, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Source: qs5yhVj1bE.exeVirustotal: Detection: 34%Perma Link
          Source: qs5yhVj1bE.exeReversingLabs: Detection: 29%
          Source: 91.193.75.221Avira URL Cloud: Label: malware
          Source: C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exeReversingLabs: Detection: 29%
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTR
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpackAvira: Label: TR/NanoCore.fadte
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: qs5yhVj1bE.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: qs5yhVj1bE.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\nZeryYFdTA\src\obj\Debug\UnicodeDataHea.pdb source: qs5yhVj1bE.exe, KwPaVQtTrKa.exe.0.dr

          Networking

          barindex
          Source: Malware configuration extractorURLs:
          Source: Malware configuration extractorURLs: 91.193.75.221
          Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
          Source: global trafficTCP traffic: 192.168.2.6:49774 -> 91.193.75.221:4040
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: qs5yhVj1bE.exe, 00000000.00000003.370291562.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369206464.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369131356.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369375880.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370179857.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369698046.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370266592.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369541182.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370024384.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369479149.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.368888065.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370223537.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369077914.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369916443.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: qs5yhVj1bE.exe, 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wQ.I
          Source: qs5yhVj1bE.exe, 00000000.00000003.373475035.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373356806.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
          Source: qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comies
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comis
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comk
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml-g
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comlt
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
          Source: qs5yhVj1bE.exe, 00000000.00000003.387245059.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.446159972.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.452696202.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386360473.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386208471.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378031583.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.377989464.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.387051919.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386016328.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTF:.
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmll
          Source: qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlX
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/y.
          Source: qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
          Source: qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comM.TTFr.
          Source: qs5yhVj1bE.exe, 00000000.00000003.377989464.000000000627C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comTTF
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378080948.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378185589.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
          Source: qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomd
          Source: qs5yhVj1bE.exe, 00000000.00000003.380742013.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380823173.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380595770.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381091108.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380965210.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd(.
          Source: qs5yhVj1bE.exe, 00000000.00000003.387245059.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386360473.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386208471.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.387051919.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386016328.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdiaa
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdr.
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comme
          Source: qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsiva
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueo.
          Source: qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comy.
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.373475035.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372318130.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372664402.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372819929.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373111381.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372996469.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373356806.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372891186.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373222995.0000000006284000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: qs5yhVj1bE.exe, 00000000.00000003.372158589.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372219053.0000000006284000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cncz
          Source: qs5yhVj1bE.exe, 00000000.00000003.372158589.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372219053.0000000006284000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnn-u
          Source: qs5yhVj1bE.exe, 00000000.00000003.372318130.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372664402.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372819929.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372996469.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372891186.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnsk
          Source: qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
          Source: qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/:.
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/X9
          Source: qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381915896.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382455154.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382220533.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382367232.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382139822.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381731140.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr-u:-
          Source: qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376223845.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376663531.000000000627E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/H
          Source: qs5yhVj1bE.exe, 00000000.00000003.374831674.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374882075.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/K.
          Source: qs5yhVj1bE.exe, 00000000.00000003.376124083.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376302609.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376779928.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376223845.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376663531.000000000627E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/U.
          Source: qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/V.
          Source: qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
          Source: qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0H
          Source: qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/K.
          Source: qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/y.
          Source: qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/l19
          Source: qs5yhVj1bE.exe, 00000000.00000003.374831674.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374882075.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vno
          Source: qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
          Source: qs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com&
          Source: qs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comte
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com-u
          Source: qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comc
          Source: qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comd
          Source: qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: qs5yhVj1bE.exe, 00000000.00000003.371821148.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371862519.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371946786.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krb-
          Source: qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krma
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comic
          Source: qs5yhVj1bE.exe, 00000000.00000003.373045408.000000000193C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comn-u
          Source: qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comnt
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.377725754.000000000627C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnL
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnk
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.h=
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cns-e
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTR

          System Summary

          barindex
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: qs5yhVj1bE.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 0_2_00EE20500_2_00EE2050
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 11_2_0006205011_2_00062050
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 13_2_02EFE48013_2_02EFE480
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 13_2_02EFE47113_2_02EFE471
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 13_2_02EFBBD413_2_02EFBBD4
          Source: qs5yhVj1bE.exe, 00000000.00000003.407386701.0000000007907000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 00000000.00000000.361404444.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 00000000.00000003.406659892.0000000004344000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 00000000.00000002.454801476.0000000007CA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000B.00000002.428177168.000000000014D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000000.432436987.0000000000D1D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.633039041.0000000003011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exeBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: qs5yhVj1bE.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: KwPaVQtTrKa.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: KwPaVQtTrKa.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: qs5yhVj1bE.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: KwPaVQtTrKa.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: qs5yhVj1bE.exeVirustotal: Detection: 34%
          Source: qs5yhVj1bE.exeReversingLabs: Detection: 29%
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile read: C:\Users\user\Desktop\qs5yhVj1bE.exeJump to behavior
          Source: qs5yhVj1bE.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe "C:\Users\user\Desktop\qs5yhVj1bE.exe"
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exeJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmpJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exeJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exeJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile created: C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exeJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8FC.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@11/9@0/1
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: qs5yhVj1bE.exe, 00000000.00000002.446620968.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, qs5yhVj1bE.exe, 0000000B.00000000.425122552.0000000000062000.00000002.00000001.01000000.00000003.sdmp, qs5yhVj1bE.exe, 0000000D.00000000.430711479.0000000000C32000.00000002.00000001.01000000.00000003.sdmp, KwPaVQtTrKa.exe.0.drBinary or memory string: SELECT TOP 1 FirstDate FROM OrderData WHERE `Order`="{0}" ORDER BY FirstDate ASCmUPDATE OrderData SET PINCode="{1}" WHERE PINCode="{0}"ACREATE DATABASE `{0}`; USE `{0}`
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6d38b3f5-33a1-41b7-a7f2-d8fe2b391c1c}
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeMutant created: \Sessions\1\BaseNamedObjects\bmFsaVVjlnNanGxhNnPYiKsN
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3980:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6004:120:WilError_01
          Source: qs5yhVj1bE.exeString found in binary or memory: note-add
          Source: qs5yhVj1bE.exeString found in binary or memory: user-add
          Source: qs5yhVj1bE.exeString found in binary or memory: <!--StartFragment -->
          Source: qs5yhVj1bE.exeString found in binary or memory: user-add
          Source: qs5yhVj1bE.exeString found in binary or memory: note-add
          Source: qs5yhVj1bE.exeString found in binary or memory: <!--StartFragment -->
          Source: qs5yhVj1bE.exeString found in binary or memory: note-add
          Source: qs5yhVj1bE.exeString found in binary or memory: user-add
          Source: qs5yhVj1bE.exeString found in binary or memory: <!--StartFragment -->
          Source: qs5yhVj1bE.exeString found in binary or memory: user-add
          Source: qs5yhVj1bE.exeString found in binary or memory: note-add
          Source: qs5yhVj1bE.exeString found in binary or memory: <<<<<<<3+<!--StartFragment -->
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: qs5yhVj1bE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: qs5yhVj1bE.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: qs5yhVj1bE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\nZeryYFdTA\src\obj\Debug\UnicodeDataHea.pdb source: qs5yhVj1bE.exe, KwPaVQtTrKa.exe.0.dr

          Data Obfuscation

          barindex
          Source: qs5yhVj1bE.exe, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: KwPaVQtTrKa.exe.0.dr, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.2.qs5yhVj1bE.exe.ee0000.0.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 11.0.qs5yhVj1bE.exe.60000.1.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 11.0.qs5yhVj1bE.exe.60000.3.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 11.0.qs5yhVj1bE.exe.60000.0.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 11.2.qs5yhVj1bE.exe.60000.0.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 0_2_016EE6F0 pushad ; retf 0_2_016EE6F1
          Source: initial sampleStatic PE information: section name: .text entropy: 7.34529223724
          Source: initial sampleStatic PE information: section name: .text entropy: 7.34529223724
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile created: C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile opened: C:\Users\user\Desktop\qs5yhVj1bE.exe:Zone.Identifier read attributes | deleteJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: qs5yhVj1bE.exe, 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: qs5yhVj1bE.exe, 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exe TID: 6180Thread sleep time: -45733s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exe TID: 6452Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5992Thread sleep time: -10145709240540247s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exe TID: 6952Thread sleep time: -21213755684765971s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7079Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1621Jump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeWindow / User API: threadDelayed 4595Jump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeWindow / User API: threadDelayed 4949Jump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeWindow / User API: foregroundWindowGot 737Jump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 45733Jump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeMemory written: C:\Users\user\Desktop\qs5yhVj1bE.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exeJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exeJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmpJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exeJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exeJump to behavior
          Source: qs5yhVj1bE.exe, 0000000D.00000002.633125756.000000000307D000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 0000000D.00000002.635689127.00000000063DD000.00000004.00000010.00020000.00000000.sdmp, qs5yhVj1bE.exe, 0000000D.00000002.635858737.000000000661E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635498905.000000000618B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program ManagerX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Users\user\Desktop\qs5yhVj1bE.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Users\user\Desktop\qs5yhVj1bE.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: qs5yhVj1bE.exe, 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000002.633039041.0000000003011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000002.633039041.0000000003011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Command and Scripting Interpreter
          1
          Scheduled Task/Job
          112
          Process Injection
          1
          Masquerading
          11
          Input Capture
          21
          Security Software Discovery
          Remote Services11
          Input Capture
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Scheduled Task/Job
          Boot or Logon Initialization Scripts1
          Scheduled Task/Job
          11
          Disable or Modify Tools
          LSASS Memory2
          Process Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Non-Standard Port
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
          Virtualization/Sandbox Evasion
          Security Account Manager21
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Remote Access Software
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer1
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Hidden Files and Directories
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common2
          Obfuscated Files or Information
          Cached Domain Credentials12
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items13
          Software Packing
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          qs5yhVj1bE.exe35%VirustotalBrowse
          qs5yhVj1bE.exe29%ReversingLabsByteCode-MSIL.Spyware.Negasteal
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe29%ReversingLabsByteCode-MSIL.Spyware.Negasteal
          SourceDetectionScannerLabelLinkDownload
          13.2.qs5yhVj1bE.exe.6280000.9.unpack100%AviraTR/NanoCore.fadteDownload File
          13.0.qs5yhVj1bE.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          13.2.qs5yhVj1bE.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          0.2.qs5yhVj1bE.exe.33c09c0.3.unpack100%AviraHEUR/AGEN.1215515Download File
          13.0.qs5yhVj1bE.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          13.0.qs5yhVj1bE.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          13.0.qs5yhVj1bE.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          13.0.qs5yhVj1bE.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          0%Avira URL Cloudsafe
          http://www.tiro.comnt0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.fontbureau.comdr.0%Avira URL Cloudsafe
          http://www.fontbureau.comy.0%Avira URL Cloudsafe
          http://www.carterandcone.comis0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/V.0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.carterandcone.coml-g0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/:.0%Avira URL Cloudsafe
          http://www.fontbureau.comTTF0%URL Reputationsafe
          http://www.fontbureau.comessed0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          91.193.75.221100%Avira URL Cloudmalware
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.zhongyicts.com.cno.h=0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.fontbureau.comd(.0%Avira URL Cloudsafe
          http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
          http://www.founder.com.cn/cnn-u0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.fontbureau.comM.TTFr.0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/U.0%Avira URL Cloudsafe
          http://www.sakkal.comd0%Avira URL Cloudsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.sakkal.comc0%Avira URL Cloudsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.galapagosdesign.com/X90%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/y.0%Avira URL Cloudsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fontbureau.com.TTF:.0%Avira URL Cloudsafe
          http://www.fontbureau.comueo.0%Avira URL Cloudsafe
          http://www.fontbureau.comsiva0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y0H0%Avira URL Cloudsafe
          http://www.fontbureau.comF0%URL Reputationsafe
          http://www.sajatypeworks.comte0%Avira URL Cloudsafe
          http://www.sandoll.co.krb-0%Avira URL Cloudsafe
          http://wQ.I0%Avira URL Cloudsafe
          http://www.fontbureau.comcomd0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/vno0%URL Reputationsafe
          http://www.fontbureau.comme0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/K.0%Avira URL Cloudsafe
          http://www.carterandcone.comlt0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/H0%URL Reputationsafe
          http://www.goodfont.co.kr-u:-0%Avira URL Cloudsafe
          http://www.founder.com.cn/cncz0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.fontbureau.coma0%URL Reputationsafe
          http://www.fontbureau.comd0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.zhongyicts.com.cns-e0%Avira URL Cloudsafe
          http://www.carterandcone.comk0%URL Reputationsafe
          http://www.sandoll.co.krma0%Avira URL Cloudsafe
          http://www.zhongyicts.com.cnk0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.sakkal.com-u0%Avira URL Cloudsafe
          http://www.tiro.comn-u0%URL Reputationsafe
          http://www.monotype.0%URL Reputationsafe
          http://www.fontbureau.comdiaa0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/l190%Avira URL Cloudsafe
          http://www.zhongyicts.com.cno.0%URL Reputationsafe
          http://www.founder.com.cn/cnsk0%Avira URL Cloudsafe
          http://www.sajatypeworks.com&0%Avira URL Cloudsafe
          http://www.tiro.comic0%URL Reputationsafe
          http://www.carterandcone.comies0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/K.0%Avira URL Cloudsafe
          http://www.zhongyicts.com.cnL0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          true
          • Avira URL Cloud: safe
          low
          91.193.75.221true
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.fontbureau.com/designersGqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.com/designers/?qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.tiro.comntqs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/bTheqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comdr.qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.comy.qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.carterandcone.comisqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/V.qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.comqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.coml-gqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.galapagosdesign.com/:.qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designersqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comTTFqs5yhVj1bE.exe, 00000000.00000003.377989464.000000000627C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comessedqs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.goodfont.co.krqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comqs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comqs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cn/cTheqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmqs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381915896.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382455154.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382220533.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382367232.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382139822.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381731140.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.comqs5yhVj1bE.exe, 00000000.00000003.370291562.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369206464.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369131356.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369375880.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370179857.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369698046.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370266592.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369541182.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370024384.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369479149.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.368888065.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370223537.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369077914.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369916443.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.zhongyicts.com.cno.h=qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.galapagosdesign.com/DPleaseqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/Y0qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comd(.qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.ascendercorp.com/typedesigners.htmlqs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cnn-uqs5yhVj1bE.exe, 00000000.00000003.372158589.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372219053.0000000006284000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fonts.comqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.sandoll.co.krqs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comM.TTFr.qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/U.qs5yhVj1bE.exe, 00000000.00000003.376124083.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376302609.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376779928.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376223845.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376663531.000000000627E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sakkal.comdqs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.deDPleaseqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sakkal.comcqs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.deqs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.377725754.000000000627C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnqs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameqs5yhVj1bE.exe, 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.carterandcone.como.qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/X9qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/y.qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sakkal.comqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com.TTF:.qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.fontbureau.comueo.qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comsivaqs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0qs5yhVj1bE.exe, 00000000.00000003.373475035.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373356806.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comqs5yhVj1bE.exe, 00000000.00000003.387245059.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.446159972.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.452696202.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386360473.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386208471.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378031583.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.377989464.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.387051919.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386016328.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.galapagosdesign.com/qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmllqs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/Y0Hqs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comFqs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comteqs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sandoll.co.krb-qs5yhVj1bE.exe, 00000000.00000003.371821148.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371862519.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371946786.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://wQ.Iqs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comcomdqs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/vnoqs5yhVj1bE.exe, 00000000.00000003.374831674.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374882075.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.commeqs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/K.qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.carterandcone.comltqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmlXqs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/Hqs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.goodfont.co.kr-u:-qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://www.founder.com.cn/cnczqs5yhVj1bE.exe, 00000000.00000003.372158589.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372219053.0000000006284000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comaqs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378080948.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378185589.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comdqs5yhVj1bE.exe, 00000000.00000003.380742013.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380823173.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380595770.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381091108.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380965210.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comlqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cns-eqs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.carterandcone.comkqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sandoll.co.krmaqs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.zhongyicts.com.cnkqs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cnqs5yhVj1bE.exe, 00000000.00000003.373475035.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372318130.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372664402.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372819929.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373111381.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372996469.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373356806.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372891186.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373222995.0000000006284000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmlqs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sakkal.com-uqs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.tiro.comn-uqs5yhVj1bE.exe, 00000000.00000003.373045408.000000000193C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/y.qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.monotype.qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comdiaaqs5yhVj1bE.exe, 00000000.00000003.387245059.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386360473.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386208471.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.387051919.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386016328.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376223845.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376663531.000000000627E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/l19qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.zhongyicts.com.cno.qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnskqs5yhVj1bE.exe, 00000000.00000003.372318130.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372664402.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372819929.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372996469.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372891186.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.sajatypeworks.com&qs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      low
                                      http://www.tiro.comicqs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comiesqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.jiyu-kobo.co.jp/K.qs5yhVj1bE.exe, 00000000.00000003.374831674.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374882075.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.zhongyicts.com.cnLqs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      91.193.75.221
                                      unknownSerbia
                                      209623DAVID_CRAIGGGtrue
                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                      Analysis ID:623785
                                      Start date and time: 10/05/202220:20:332022-05-10 20:20:33 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 13m 7s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Sample file name:qs5yhVj1bE.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:24
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@11/9@0/1
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HDC Information:
                                      • Successful, ratio: 0.2% (good quality ratio 0.1%)
                                      • Quality average: 44.4%
                                      • Quality standard deviation: 22.1%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 36
                                      • Number of non-executed functions: 1
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                      • Execution Graph export aborted for target qs5yhVj1bE.exe, PID 4128 because there are no executed function
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      20:22:00API Interceptor672x Sleep call for process: qs5yhVj1bE.exe modified
                                      20:22:09API Interceptor40x Sleep call for process: powershell.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      91.193.75.221pp.exeGet hashmaliciousBrowse
                                        invoice.xlsxGet hashmaliciousBrowse
                                          Signed Charter Agreement_Apr_08th_2022.vbsGet hashmaliciousBrowse
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            DAVID_CRAIGGGxVDAUvl3Pn.exeGet hashmaliciousBrowse
                                            • 91.193.75.134
                                            e1f388b8a086e034b1fbd94ca7341008.exeGet hashmaliciousBrowse
                                            • 185.140.53.3
                                            CMACGM-WBINS9013246-20210714-125247.pdf.vbsGet hashmaliciousBrowse
                                            • 91.193.75.131
                                            po-iteam DOO00076543.exeGet hashmaliciousBrowse
                                            • 91.193.75.132
                                            Charter request details.vbsGet hashmaliciousBrowse
                                            • 91.193.75.194
                                            SWIFT_poruka ERSTE BANK ad NOVI SAD.vbsGet hashmaliciousBrowse
                                            • 91.193.75.133
                                            IMG2_455982134.exeGet hashmaliciousBrowse
                                            • 185.140.53.174
                                            Purchase Report.vbsGet hashmaliciousBrowse
                                            • 91.193.75.175
                                            BRINK GMBH BESTELLUNG _ ANFORDERUNG SH238429 12x2.5 mm#U00b2.exeGet hashmaliciousBrowse
                                            • 185.140.53.72
                                            Scan 1000276325462 document.vbsGet hashmaliciousBrowse
                                            • 91.193.75.131
                                            NEW ORDER 0522 202204280000883 pdf.vbsGet hashmaliciousBrowse
                                            • 91.193.75.132
                                            commercial invoice.vbsGet hashmaliciousBrowse
                                            • 185.165.153.84
                                            CHECK#718263.VBSGet hashmaliciousBrowse
                                            • 185.140.53.12
                                            eW8XdXzJ0K.exeGet hashmaliciousBrowse
                                            • 91.193.75.227
                                            HIkhD4L4gC.exeGet hashmaliciousBrowse
                                            • 185.140.53.212
                                            DHL Shipment Notice of Arrival AWB 8032697940.vbsGet hashmaliciousBrowse
                                            • 91.193.75.209
                                            Invoice.vbsGet hashmaliciousBrowse
                                            • 91.193.75.227
                                            Payment-Advice.vbsGet hashmaliciousBrowse
                                            • 91.193.75.189
                                            Invoice Order.vbsGet hashmaliciousBrowse
                                            • 91.193.75.203
                                            download.dat.exeGet hashmaliciousBrowse
                                            • 91.193.75.203
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):1308
                                            Entropy (8bit):5.345811588615766
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                            MD5:2E016B886BDB8389D2DD0867BE55F87B
                                            SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                            SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                            SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):22192
                                            Entropy (8bit):5.602492204353924
                                            Encrypted:false
                                            SSDEEP:384:ktCDL+wpnO2coZyc0WoQCzmuOMSB+AjultIM47nvHg3hInQML+KfmAV7N4KWyiZh:h42BEcdogM4pClt/k66LKOpJW+4
                                            MD5:B4AA5769644239915B226E839F307C1E
                                            SHA1:ADC45F2262390A555CD93EBD2ABF22ECC83CE393
                                            SHA-256:55B7922DDBF4A8588028D11B837EA5182EE702439381A1DC3D8096CF633F6020
                                            SHA-512:417EDABD8221B67F918EB4A5EC3BCEAEF1DFE85A06E30FD172037E98ACA10BD54824A13C1C9F6EBCF1B41B922F6B6C792DF885EAB5D2EE93045296CA2BA3C293
                                            Malicious:false
                                            Reputation:low
                                            Preview:@...e...........d.......J...C.9.6.....c...-..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:very short file (no magic)
                                            Category:dropped
                                            Size (bytes):1
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3:U:U
                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:1
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:very short file (no magic)
                                            Category:dropped
                                            Size (bytes):1
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3:U:U
                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                            Malicious:false
                                            Preview:1
                                            Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            File Type:XML 1.0 document, ASCII text
                                            Category:dropped
                                            Size (bytes):1610
                                            Entropy (8bit):5.120231854259472
                                            Encrypted:false
                                            SSDEEP:24:2di4+S2qh/S1K2ky1mo2dUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtLoFxvn:cgea6YrFdOFzOzN33ODOiDdKrsuTMv
                                            MD5:922336D1203B1BD3F7EB9FCF816A3E9D
                                            SHA1:D0D9EF055CCD5DFEDD721BC8A433F7C3385E5BC2
                                            SHA-256:EE83E380DA94FD5E09892592631E632EC66975C345A44FA277CEFD5CF52E3A45
                                            SHA-512:2F9453E7524C16E9C117F3EE6A3CBA78B2DE3ACD70AB2E76B3F11453F0935FF5637F6BBD767D6C6391534E36B286FD830BB90E5AED7018972B3AF0CA9613F277
                                            Malicious:true
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailab
                                            Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):8
                                            Entropy (8bit):3.0
                                            Encrypted:false
                                            SSDEEP:3:gn:g
                                            MD5:977AD6A31C19E67C11F89EC07FED7169
                                            SHA1:90ABADF2D64F2ACBB88BE7BD4B665666457880D0
                                            SHA-256:37B518D9943E2B65C745D0BB19E1D0705780AE58731E78C7E0D3DE49F2DE5DC5
                                            SHA-512:D467D520118A9CC22035747153318E8FFD3336E3C0976A33CF82ABC3F86CE09B491E4218E7592ED9FDFA0C040883C886B02B66E4F1E201C077F5B87A6B949B16
                                            Malicious:true
                                            Preview:.F.w.2.H
                                            Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):977920
                                            Entropy (8bit):7.143270648209935
                                            Encrypted:false
                                            SSDEEP:12288:2TcmYDfxt7J0Acp6R8gNtyRAtwPYbfxueUdzWNGpfaz6LSTL:2K2yQdmJueQUoLS
                                            MD5:FC38C021FB2A8C4D49B9F3E3FD91B03B
                                            SHA1:F790E60E1A48A0FAF5C311EE8C882F6D08653490
                                            SHA-256:AF66BAEAEAF66B03D22BFBA26CFAFF343489FDF3ECCB9E6078017C93FD6155C5
                                            SHA-512:B4DD0AC7BAB3E95116F628CD858451E1C13720FC3D610CB5E7DCACFE9968B5506553EFBCB55011B12AA2C524D4B6810013ACDA2E9BB5BF411980B19AF59606C4
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 29%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...S.yb..............0......\........... ........@.. .......................@............@.....................................O........W................... ......t................................................ ............... ..H............text........ ...................... ..`.rsrc....W.......X..................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:false
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):5823
                                            Entropy (8bit):5.375421041469728
                                            Encrypted:false
                                            SSDEEP:96:BZ4TLTN3aqDo1ZSZjTLTN3aqDo1ZWpXBjZMTLTN3aqDo1Z4oRRKZN:7
                                            MD5:64AF3EC2423BC370715C5AD9F14EE9F3
                                            SHA1:3D6753009373C44CF9C6B064D549173FAA9D1482
                                            SHA-256:AFE2B3927B15784A704D2A8AF642C5E62FA15A7A310006DA12835FEC40FED108
                                            SHA-512:7FED25F18036C958DE2B6D561C8A87B8FB292B9ACB365319B98A98400B03E514BF625C4A8472A7CBECF7E376C2B3873F9DE04972C8530DF5F438F7F2FD0D3967
                                            Malicious:false
                                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510202208..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 585948 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe..Process ID: 6664..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510202208..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe..**********************..Windows PowerShell transcript start..Start time: 20220510202551..Username: computer\user..RunAs User: DES
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.143270648209935
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:qs5yhVj1bE.exe
                                            File size:977920
                                            MD5:fc38c021fb2a8c4d49b9f3e3fd91b03b
                                            SHA1:f790e60e1a48a0faf5c311ee8c882f6d08653490
                                            SHA256:af66baeaeaf66b03d22bfba26cfaff343489fdf3eccb9e6078017c93fd6155c5
                                            SHA512:b4dd0ac7bab3e95116f628cd858451e1c13720fc3d610cb5e7dcacfe9968b5506553efbcb55011b12aa2c524d4b6810013acda2e9bb5bf411980b19af59606c4
                                            SSDEEP:12288:2TcmYDfxt7J0Acp6R8gNtyRAtwPYbfxueUdzWNGpfaz6LSTL:2K2yQdmJueQUoLS
                                            TLSH:86259D1072D8EE99E02912B1D875C5F00731BE09D5B6D60F29997ECE38B33836566F2B
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...S.yb..............0......\........... ........@.. .......................@............@................................
                                            Icon Hash:f274fec6b6c2e00c
                                            Entrypoint:0x4da9fe
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x6279E653 [Tue May 10 04:13:07 2022 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            sub eax, 3A002000h
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xda9ac0x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xdc0000x15704.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf20000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xda8740x1c.text
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xd8a0c0xd8c00False0.718579918181data7.34529223724IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0xdc0000x157040x15800False0.151628361192data4.00256037561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xf20000xc0x400False0.0234375data0.0446870062539IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountry
                                            RT_ICON0xdc1680x8a8data
                                            RT_ICON0xdca200x568GLS_BINARY_LSB_FIRST
                                            RT_ICON0xdcf980x10828data
                                            RT_ICON0xed7d00x25a8data
                                            RT_ICON0xefd880x10a8data
                                            RT_ICON0xf0e400x468GLS_BINARY_LSB_FIRST
                                            RT_GROUP_ICON0xf12b80x5adata
                                            RT_VERSION0xf13240x3dcdata
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyrightCopyright 2011 BASeCamp Software Solutions
                                            Assembly Version1.4.8.0
                                            InternalNameUnicodeDataHea.exe
                                            FileVersion1.4.8.0
                                            CompanyNameBASeCamp Software Solutions
                                            LegalTrademarks
                                            Comments
                                            ProductNameBASeCamp JobClock
                                            ProductVersion1.4.8.0
                                            FileDescriptionJobClock Administration Applet
                                            OriginalFilenameUnicodeDataHea.exe
                                            TimestampSource PortDest PortSource IPDest IP
                                            May 10, 2022 20:22:25.670742035 CEST497744040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:25.711811066 CEST40404977491.193.75.221192.168.2.6
                                            May 10, 2022 20:22:26.406785011 CEST497744040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:26.447760105 CEST40404977491.193.75.221192.168.2.6
                                            May 10, 2022 20:22:27.099265099 CEST497744040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:27.140232086 CEST40404977491.193.75.221192.168.2.6
                                            May 10, 2022 20:22:31.419179916 CEST497814040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:31.463193893 CEST40404978191.193.75.221192.168.2.6
                                            May 10, 2022 20:22:32.094806910 CEST497814040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:32.135623932 CEST40404978191.193.75.221192.168.2.6
                                            May 10, 2022 20:22:32.705468893 CEST497814040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:32.746371031 CEST40404978191.193.75.221192.168.2.6
                                            May 10, 2022 20:22:37.216985941 CEST497824040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:37.257924080 CEST40404978291.193.75.221192.168.2.6
                                            May 10, 2022 20:22:37.907769918 CEST497824040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:37.948761940 CEST40404978291.193.75.221192.168.2.6
                                            May 10, 2022 20:22:38.595345974 CEST497824040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:38.636367083 CEST40404978291.193.75.221192.168.2.6
                                            May 10, 2022 20:22:42.909444094 CEST497894040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:42.950333118 CEST40404978991.193.75.221192.168.2.6
                                            May 10, 2022 20:22:43.455065966 CEST497894040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:43.495976925 CEST40404978991.193.75.221192.168.2.6
                                            May 10, 2022 20:22:44.001996040 CEST497894040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:44.043122053 CEST40404978991.193.75.221192.168.2.6
                                            May 10, 2022 20:22:48.050414085 CEST497914040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:48.092804909 CEST40404979191.193.75.221192.168.2.6
                                            May 10, 2022 20:22:48.643059969 CEST497914040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:48.684036970 CEST40404979191.193.75.221192.168.2.6
                                            May 10, 2022 20:22:49.252594948 CEST497914040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:49.293675900 CEST40404979191.193.75.221192.168.2.6
                                            May 10, 2022 20:22:53.300666094 CEST497934040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:53.341578007 CEST40404979391.193.75.221192.168.2.6
                                            May 10, 2022 20:22:53.956068039 CEST497934040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:53.996957064 CEST40404979391.193.75.221192.168.2.6
                                            May 10, 2022 20:22:54.643557072 CEST497934040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:54.684783936 CEST40404979391.193.75.221192.168.2.6
                                            May 10, 2022 20:22:58.821120977 CEST497954040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:58.862413883 CEST40404979591.193.75.221192.168.2.6
                                            May 10, 2022 20:22:59.425177097 CEST497954040192.168.2.691.193.75.221
                                            May 10, 2022 20:22:59.466072083 CEST40404979591.193.75.221192.168.2.6
                                            May 10, 2022 20:23:00.112796068 CEST497954040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:00.153745890 CEST40404979591.193.75.221192.168.2.6
                                            May 10, 2022 20:23:04.161305904 CEST497984040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:04.202254057 CEST40404979891.193.75.221192.168.2.6
                                            May 10, 2022 20:23:04.753804922 CEST497984040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:04.794708014 CEST40404979891.193.75.221192.168.2.6
                                            May 10, 2022 20:23:05.456967115 CEST497984040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:05.497823000 CEST40404979891.193.75.221192.168.2.6
                                            May 10, 2022 20:23:09.522205114 CEST497994040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:09.563852072 CEST40404979991.193.75.221192.168.2.6
                                            May 10, 2022 20:23:10.113595009 CEST497994040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:10.155294895 CEST40404979991.193.75.221192.168.2.6
                                            May 10, 2022 20:23:10.723072052 CEST497994040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:10.763861895 CEST40404979991.193.75.221192.168.2.6
                                            May 10, 2022 20:23:14.934631109 CEST498024040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:14.975474119 CEST40404980291.193.75.221192.168.2.6
                                            May 10, 2022 20:23:15.550478935 CEST498024040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:15.591298103 CEST40404980291.193.75.221192.168.2.6
                                            May 10, 2022 20:23:16.159353018 CEST498024040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:16.200304985 CEST40404980291.193.75.221192.168.2.6
                                            May 10, 2022 20:23:22.127484083 CEST498124040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:22.168374062 CEST40404981291.193.75.221192.168.2.6
                                            May 10, 2022 20:23:22.814657927 CEST498124040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:22.855741024 CEST40404981291.193.75.221192.168.2.6
                                            May 10, 2022 20:23:23.422885895 CEST498124040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:23.463851929 CEST40404981291.193.75.221192.168.2.6
                                            May 10, 2022 20:23:27.473067045 CEST498424040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:27.513940096 CEST40404984291.193.75.221192.168.2.6
                                            May 10, 2022 20:23:28.017077923 CEST498424040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:28.057913065 CEST40404984291.193.75.221192.168.2.6
                                            May 10, 2022 20:23:28.563960075 CEST498424040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:28.604878902 CEST40404984291.193.75.221192.168.2.6
                                            May 10, 2022 20:23:32.628253937 CEST498574040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:32.669279099 CEST40404985791.193.75.221192.168.2.6
                                            May 10, 2022 20:23:33.173703909 CEST498574040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:33.214698076 CEST40404985791.193.75.221192.168.2.6
                                            May 10, 2022 20:23:33.720746040 CEST498574040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:33.761704922 CEST40404985791.193.75.221192.168.2.6
                                            May 10, 2022 20:23:37.783387899 CEST498594040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:37.824831009 CEST40404985991.193.75.221192.168.2.6
                                            May 10, 2022 20:23:38.346142054 CEST498594040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:38.387140989 CEST40404985991.193.75.221192.168.2.6
                                            May 10, 2022 20:23:38.928134918 CEST498594040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:38.969187975 CEST40404985991.193.75.221192.168.2.6
                                            May 10, 2022 20:23:42.972807884 CEST498604040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:43.013845921 CEST40404986091.193.75.221192.168.2.6
                                            May 10, 2022 20:23:43.658948898 CEST498604040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:43.699862003 CEST40404986091.193.75.221192.168.2.6
                                            May 10, 2022 20:23:44.324449062 CEST498604040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:44.365216017 CEST40404986091.193.75.221192.168.2.6
                                            May 10, 2022 20:23:48.379189968 CEST498634040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:48.420047998 CEST40404986391.193.75.221192.168.2.6
                                            May 10, 2022 20:23:48.925017118 CEST498634040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:48.966682911 CEST40404986391.193.75.221192.168.2.6
                                            May 10, 2022 20:23:49.472002983 CEST498634040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:49.512907028 CEST40404986391.193.75.221192.168.2.6
                                            May 10, 2022 20:23:53.519812107 CEST498644040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:53.560600996 CEST40404986491.193.75.221192.168.2.6
                                            May 10, 2022 20:23:54.066107035 CEST498644040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:54.106925964 CEST40404986491.193.75.221192.168.2.6
                                            May 10, 2022 20:23:54.613080025 CEST498644040192.168.2.691.193.75.221
                                            May 10, 2022 20:23:54.654110909 CEST40404986491.193.75.221192.168.2.6

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:20:21:41
                                            Start date:10/05/2022
                                            Path:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\qs5yhVj1bE.exe"
                                            Imagebase:0xee0000
                                            File size:977920 bytes
                                            MD5 hash:FC38C021FB2A8C4D49B9F3E3FD91B03B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            Reputation:low

                                            Target ID:5
                                            Start time:20:22:04
                                            Start date:10/05/2022
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe
                                            Imagebase:0xf10000
                                            File size:430592 bytes
                                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Reputation:high

                                            Target ID:6
                                            Start time:20:22:05
                                            Start date:10/05/2022
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6406f0000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:7
                                            Start time:20:22:05
                                            Start date:10/05/2022
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp
                                            Imagebase:0xc20000
                                            File size:185856 bytes
                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:8
                                            Start time:20:22:07
                                            Start date:10/05/2022
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6406f0000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:11
                                            Start time:20:22:10
                                            Start date:10/05/2022
                                            Path:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            Imagebase:0x60000
                                            File size:977920 bytes
                                            MD5 hash:FC38C021FB2A8C4D49B9F3E3FD91B03B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low

                                            Target ID:13
                                            Start time:20:22:12
                                            Start date:10/05/2022
                                            Path:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                            Imagebase:0xc30000
                                            File size:977920 bytes
                                            MD5 hash:FC38C021FB2A8C4D49B9F3E3FD91B03B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:14.4%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:95
                                              Total number of Limit Nodes:9
                                              execution_graph 7876 16e4248 7877 16e425a 7876->7877 7878 16e4266 7877->7878 7882 16e4359 7877->7882 7887 16e3dd8 7878->7887 7880 16e4285 7883 16e437d 7882->7883 7891 16e4458 7883->7891 7895 16e4449 7883->7895 7888 16e3de3 7887->7888 7903 16e7048 7888->7903 7890 16e753e 7890->7880 7892 16e447f 7891->7892 7893 16e455c 7892->7893 7899 16e3fc4 7892->7899 7897 16e447f 7895->7897 7896 16e455c 7896->7896 7897->7896 7898 16e3fc4 CreateActCtxA 7897->7898 7898->7896 7900 16e54e8 CreateActCtxA 7899->7900 7902 16e55ab 7900->7902 7904 16e7053 7903->7904 7907 16e713c 7904->7907 7906 16e7bf5 7906->7890 7908 16e7147 7907->7908 7911 16e716c 7908->7911 7910 16e7cda 7910->7906 7912 16e7177 7911->7912 7915 16e719c 7912->7915 7914 16e7dca 7914->7910 7916 16e71a7 7915->7916 7918 16e84de 7916->7918 7922 16ea440 7916->7922 7926 16ea450 7916->7926 7917 16e851c 7917->7914 7918->7917 7930 16ec558 7918->7930 7935 16ea548 7922->7935 7943 16ea538 7922->7943 7923 16ea45f 7923->7918 7927 16ea45f 7926->7927 7928 16ea548 2 API calls 7926->7928 7929 16ea538 2 API calls 7926->7929 7927->7918 7928->7927 7929->7927 7931 16ec589 7930->7931 7932 16ec5ad 7931->7932 7963 16ec708 7931->7963 7967 16ec718 7931->7967 7932->7917 7936 16ea55b 7935->7936 7937 16ea573 7936->7937 7951 16ea7c0 7936->7951 7955 16ea7d0 7936->7955 7937->7923 7938 16ea56b 7938->7937 7939 16ea770 GetModuleHandleW 7938->7939 7940 16ea79d 7939->7940 7940->7923 7944 16ea55b 7943->7944 7945 16ea573 7944->7945 7949 16ea7c0 LoadLibraryExW 7944->7949 7950 16ea7d0 LoadLibraryExW 7944->7950 7945->7923 7946 16ea56b 7946->7945 7947 16ea770 GetModuleHandleW 7946->7947 7948 16ea79d 7947->7948 7948->7923 7949->7946 7950->7946 7952 16ea7e4 7951->7952 7954 16ea809 7952->7954 7959 16e9890 7952->7959 7954->7938 7956 16ea7e4 7955->7956 7957 16ea809 7956->7957 7958 16e9890 LoadLibraryExW 7956->7958 7957->7938 7958->7957 7960 16ea9b0 LoadLibraryExW 7959->7960 7962 16eaa29 7960->7962 7962->7954 7964 16ec725 7963->7964 7965 16ec75f 7964->7965 7971 16eb20c 7964->7971 7965->7932 7968 16ec725 7967->7968 7969 16ec75f 7968->7969 7970 16eb20c 3 API calls 7968->7970 7969->7932 7970->7969 7972 16eb217 7971->7972 7974 16ed458 7972->7974 7975 16eb2ac 7972->7975 7976 16eb2b7 7975->7976 7977 16e719c 3 API calls 7976->7977 7978 16ed4c7 7977->7978 7981 16ef250 7978->7981 7979 16ed500 7979->7974 7983 16ef281 7981->7983 7984 16ef2cd 7981->7984 7982 16ef28d 7982->7979 7983->7982 7985 16ef6d0 LoadLibraryExW GetModuleHandleW 7983->7985 7984->7979 7985->7984 7986 16eca58 DuplicateHandle 7987 16ecaee 7986->7987 7988 16ec830 GetCurrentProcess 7989 16ec8aa GetCurrentThread 7988->7989 7991 16ec8a3 7988->7991 7990 16ec8e7 GetCurrentProcess 7989->7990 7992 16ec8e0 7989->7992 7995 16ec91d 7990->7995 7991->7989 7992->7990 7993 16ec945 GetCurrentThreadId 7994 16ec976 7993->7994 7995->7993

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 016EC890
                                              • GetCurrentThread.KERNEL32 ref: 016EC8CD
                                              • GetCurrentProcess.KERNEL32 ref: 016EC90A
                                              • GetCurrentThreadId.KERNEL32 ref: 016EC963
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448212070.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16e0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 7e40fcd6e85a9396e447a11f0901743e5c401345a4da5716b5fc30b39d31ab29
                                              • Instruction ID: ccebaf4bbb45583d75d3e6e133a75bf37ad7d0567bfb15ba422a0bdcd2f3d1f9
                                              • Opcode Fuzzy Hash: 7e40fcd6e85a9396e447a11f0901743e5c401345a4da5716b5fc30b39d31ab29
                                              • Instruction Fuzzy Hash: F05142B09017488FDB14CFA9DA48BDEBBF0AF88314F24855AE419A7390D7745984CF65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 016EC890
                                              • GetCurrentThread.KERNEL32 ref: 016EC8CD
                                              • GetCurrentProcess.KERNEL32 ref: 016EC90A
                                              • GetCurrentThreadId.KERNEL32 ref: 016EC963
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448212070.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16e0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: e55ce09b8c9588ddb89920331e6703e63a326fba07a93fb6f0ccbadc75b0e560
                                              • Instruction ID: 02f4f47b13a151fe17b85fd4f8f411c220748beb6f81361ed3c7feefedc85810
                                              • Opcode Fuzzy Hash: e55ce09b8c9588ddb89920331e6703e63a326fba07a93fb6f0ccbadc75b0e560
                                              • Instruction Fuzzy Hash: BA5142B09017488FDB14CFA9DA48BDEBFF0AF88314F208559E419A7350CB746984CF65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 38 16ea548-16ea55d call 16e982c 41 16ea55f 38->41 42 16ea573-16ea577 38->42 91 16ea565 call 16ea7c0 41->91 92 16ea565 call 16ea7d0 41->92 43 16ea58b-16ea5cc 42->43 44 16ea579-16ea583 42->44 49 16ea5ce-16ea5d6 43->49 50 16ea5d9-16ea5e7 43->50 44->43 45 16ea56b-16ea56d 45->42 48 16ea6a8-16ea768 45->48 86 16ea76a-16ea76d 48->86 87 16ea770-16ea79b GetModuleHandleW 48->87 49->50 52 16ea60b-16ea60d 50->52 53 16ea5e9-16ea5ee 50->53 56 16ea610-16ea617 52->56 54 16ea5f9 53->54 55 16ea5f0-16ea5f7 call 16e9838 53->55 59 16ea5fb-16ea609 54->59 55->59 60 16ea619-16ea621 56->60 61 16ea624-16ea62b 56->61 59->56 60->61 62 16ea62d-16ea635 61->62 63 16ea638-16ea641 call 16e9848 61->63 62->63 68 16ea64e-16ea653 63->68 69 16ea643-16ea64b 63->69 71 16ea655-16ea65c 68->71 72 16ea671-16ea67e 68->72 69->68 71->72 73 16ea65e-16ea66e call 16e9858 call 16e9868 71->73 77 16ea680-16ea69e 72->77 78 16ea6a1-16ea6a7 72->78 73->72 77->78 86->87 88 16ea79d-16ea7a3 87->88 89 16ea7a4-16ea7b8 87->89 88->89 91->45 92->45
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 016EA78E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448212070.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16e0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 0e901820ab977eca6b375a00ee45aad60174eb171a900ce2e0c47ef8460a8d66
                                              • Instruction ID: e6c95479636674318fc8d71127037a7e0b113e49583a7c4c09d9dfecb86787a1
                                              • Opcode Fuzzy Hash: 0e901820ab977eca6b375a00ee45aad60174eb171a900ce2e0c47ef8460a8d66
                                              • Instruction Fuzzy Hash: 6A711570A01B058FDB24DF69D95879ABBF2BF88204F008A2ED546D7B50DB74E846CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 93 16e3fc4-16e55a9 CreateActCtxA 96 16e55ab-16e55b1 93->96 97 16e55b2-16e560c 93->97 96->97 104 16e560e-16e5611 97->104 105 16e561b-16e561f 97->105 104->105 106 16e5630 105->106 107 16e5621-16e562d 105->107 107->106
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 016E5599
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448212070.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16e0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 8c18aaedaa48977f5ccf38a039094d03123c309234c4980c02c8284af387180a
                                              • Instruction ID: acd9d65870436ec9a861988761384ee7439c38441d3a4cbba1955ea1cd154518
                                              • Opcode Fuzzy Hash: 8c18aaedaa48977f5ccf38a039094d03123c309234c4980c02c8284af387180a
                                              • Instruction Fuzzy Hash: 0A41E070D05718CFDB24DFA9C848B9EBBB5FF48308F10815AD409AB251DB75698ACF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 109 16eca58-16ecaec DuplicateHandle 110 16ecaee-16ecaf4 109->110 111 16ecaf5-16ecb12 109->111 110->111
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016ECADF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448212070.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16e0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 0350d5d0f569ed9c5d6c33951f413321073fc5c02c25dbfb3f74ac9f4f3c87c7
                                              • Instruction ID: 8b0639bdac073e4d5e29acf42f97469d48a26c159d5ac19144d872ccf6534ce2
                                              • Opcode Fuzzy Hash: 0350d5d0f569ed9c5d6c33951f413321073fc5c02c25dbfb3f74ac9f4f3c87c7
                                              • Instruction Fuzzy Hash: 0321C2B59012599FDB10CFA9D984ADEBBF8FB48324F14841AE914B7310D374A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 114 16eca50-16ecaec DuplicateHandle 115 16ecaee-16ecaf4 114->115 116 16ecaf5-16ecb12 114->116 115->116
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016ECADF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448212070.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16e0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: c2a3ff7d9c67efe96633da02d3d511e5480242263b861a5ca51b0ad022c22c35
                                              • Instruction ID: 76d68420e6c41e107f8fa2521681839ddb583199341d31f4df8f9e078084bc73
                                              • Opcode Fuzzy Hash: c2a3ff7d9c67efe96633da02d3d511e5480242263b861a5ca51b0ad022c22c35
                                              • Instruction Fuzzy Hash: 1121CFB5D002499FDB10CFA9D984AEEBBF4FB48324F14851AE914B7350D378A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 119 16e9890-16ea9f0 121 16ea9f8-16eaa27 LoadLibraryExW 119->121 122 16ea9f2-16ea9f5 119->122 123 16eaa29-16eaa2f 121->123 124 16eaa30-16eaa4d 121->124 122->121 123->124
                                              APIs
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,016EA809,00000800,00000000,00000000), ref: 016EAA1A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448212070.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16e0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 8e63f4e3ade7c8bee542de813d1fe0523b8a9a9133f13a3af4563b2e51732bde
                                              • Instruction ID: f91aad3ef00c14a808266a5bb370d255c6ec1e7efd2dbed30d8ab1bef999106f
                                              • Opcode Fuzzy Hash: 8e63f4e3ade7c8bee542de813d1fe0523b8a9a9133f13a3af4563b2e51732bde
                                              • Instruction Fuzzy Hash: 2B1103B69043489FDB10CF9AC848BAEFBF4AB48314F15852AE915B7300C374A985CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 127 16ea9a8-16ea9f0 128 16ea9f8-16eaa27 LoadLibraryExW 127->128 129 16ea9f2-16ea9f5 127->129 130 16eaa29-16eaa2f 128->130 131 16eaa30-16eaa4d 128->131 129->128 130->131
                                              APIs
                                              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,016EA809,00000800,00000000,00000000), ref: 016EAA1A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448212070.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16e0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 00a07d1d92ee2d92e70300f239d42c4259d08df8e1ef745540d7c1d9763255f3
                                              • Instruction ID: 957f0b8456b5e07e8205bc89b3c2f1c57f497fad51fff0d79a8d227f4b9ccbd7
                                              • Opcode Fuzzy Hash: 00a07d1d92ee2d92e70300f239d42c4259d08df8e1ef745540d7c1d9763255f3
                                              • Instruction Fuzzy Hash: AA11D0B6D003498FDB10CF99C948BEEBBF4AB58224F15852AD929B7610C378A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 134 16ea728-16ea768 135 16ea76a-16ea76d 134->135 136 16ea770-16ea79b GetModuleHandleW 134->136 135->136 137 16ea79d-16ea7a3 136->137 138 16ea7a4-16ea7b8 136->138 137->138
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 016EA78E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448212070.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16e0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 9ab8042651fcb2462dba8a3d4bbf10820f2de62f9e1685426db0da84bc1858bd
                                              • Instruction ID: 85bdecf3d8dfbb8da4898c114d00474f35c9a89297790cebbaf108085370ce1e
                                              • Opcode Fuzzy Hash: 9ab8042651fcb2462dba8a3d4bbf10820f2de62f9e1685426db0da84bc1858bd
                                              • Instruction Fuzzy Hash: 7011D2B5D006498FDB10CF9AC848BDFFBF5AB88224F15851AD819A7610C375A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.447977059.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_167d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8798e600780225b54c85843bfa63ff89052d290e19532f6c5eacc1c961b246ca
                                              • Instruction ID: c3037c2281f938dbfd4344d5e3d169b338a9203b9c9b8b036a89595ba2eb8258
                                              • Opcode Fuzzy Hash: 8798e600780225b54c85843bfa63ff89052d290e19532f6c5eacc1c961b246ca
                                              • Instruction Fuzzy Hash: 432103B1504244DFEB15DF54D9C0B2ABF65FF88328F24CA69E9054B206C336D856CBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.447977059.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_167d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 818a8ec8455e4da120420f3ce0750e1000e7b00cc2195bb1405c7d2c19c20212
                                              • Instruction ID: abb7ce59f89a1dc9301143f28aeff92f009a85fbd890a5649bea89bd8e5fe76b
                                              • Opcode Fuzzy Hash: 818a8ec8455e4da120420f3ce0750e1000e7b00cc2195bb1405c7d2c19c20212
                                              • Instruction Fuzzy Hash: CE2103B1604244DFDB11DF54EDC0B26BF66FF84325F248AA9E9094B346C336D846C6A1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448068091.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_168d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dc9d30245f11617ee38eefcfc3139f5b63aff7dc0decdfb05265a91f03c9e45c
                                              • Instruction ID: 43bd3d101e85873e083d89b096122582c8c428f11c9e90403cd2a33ca09224f5
                                              • Opcode Fuzzy Hash: dc9d30245f11617ee38eefcfc3139f5b63aff7dc0decdfb05265a91f03c9e45c
                                              • Instruction Fuzzy Hash: 13212571608204DFDB15EF54D9C0B26BB61FB84358F20C669D9494B386C336D847CA71
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448068091.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_168d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0d472062cf47020c114248108b368b70e2599f7aa62bebfb584467f2c903a21e
                                              • Instruction ID: 48a1bb21ad5bda046d85b1633c1fea2f7d20a7143a0c5e4c7a1635a96e464c17
                                              • Opcode Fuzzy Hash: 0d472062cf47020c114248108b368b70e2599f7aa62bebfb584467f2c903a21e
                                              • Instruction Fuzzy Hash: EB21D3B1504204EFDB01EF94D9D0B26BB65FB84328F24C6A9EA494B386C336D846CA71
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448068091.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_168d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e08f5c51a10b84adb08514e5a0b9a5cc2779773f80d953d2f568b216de2cdd58
                                              • Instruction ID: 75245d8419c8eb3a8eacd7d094ed1a1a05b38a91d6e67021e15d552b44214322
                                              • Opcode Fuzzy Hash: e08f5c51a10b84adb08514e5a0b9a5cc2779773f80d953d2f568b216de2cdd58
                                              • Instruction Fuzzy Hash: 9521AE755093808FDB03CF24D990B15BF71EB46214F28C6EAD8498B697C33AD84BCB62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.447977059.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_167d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c702fd562b5f93e8e4b2e9ff7baf791e5e7de14944204115b6362cb0f0e05a08
                                              • Instruction ID: 7cb70bfa69d8eee2155b912438671a1459c20bd17b508866a6a0bccb111646b9
                                              • Opcode Fuzzy Hash: c702fd562b5f93e8e4b2e9ff7baf791e5e7de14944204115b6362cb0f0e05a08
                                              • Instruction Fuzzy Hash: DB11AF76504280DFDB12CF54D9C4B1ABF71FB84324F24C6A9D8450B656C336D45ACBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.447977059.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_167d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c702fd562b5f93e8e4b2e9ff7baf791e5e7de14944204115b6362cb0f0e05a08
                                              • Instruction ID: 195e66ad739a9aa3f99b417d6fc5c6598b258ef3f2f937f4d87c5eaf72adcd26
                                              • Opcode Fuzzy Hash: c702fd562b5f93e8e4b2e9ff7baf791e5e7de14944204115b6362cb0f0e05a08
                                              • Instruction Fuzzy Hash: F3119A76504280CFCB12CF54E9C4B16BF62FB84325F2886A9D8084B656C33AD45ACBA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.448068091.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_168d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6d8453f2856e9fffd06841d27046e1044311c887d38c2cdc4125c35467cc6d87
                                              • Instruction ID: 1cdd53039cb56d7f06175d9be3cb59b49aff8c7ad32892d54b229328b25ba728
                                              • Opcode Fuzzy Hash: 6d8453f2856e9fffd06841d27046e1044311c887d38c2cdc4125c35467cc6d87
                                              • Instruction Fuzzy Hash: FD11BB75944284DFCB02DF54C9D0B15BFB1FB84324F28C6A9D9494B796C33AD44ACB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.447977059.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_167d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 517658e4cc20beae546b5cbd4a81d7b8400b3d8d84acded06206cf268ecccfb4
                                              • Instruction ID: 5edd9bd3e30d3dd2b92da8ad0cc837a727511ac5ceb26e66f3c497458e639949
                                              • Opcode Fuzzy Hash: 517658e4cc20beae546b5cbd4a81d7b8400b3d8d84acded06206cf268ecccfb4
                                              • Instruction Fuzzy Hash: 1701F271008384AAE7115E69CD84B77FF98EF41278F08C91AEE045B286D3789845CAB1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.447977059.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_167d000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fd09a76693615d534431e73067330f636b11debdb3f55ba7fcedd0d1824fcca2
                                              • Instruction ID: 67152be9ea6b6caeec4eb4a8446c7773227df9fae616a75f4df37f010e2bad98
                                              • Opcode Fuzzy Hash: fd09a76693615d534431e73067330f636b11debdb3f55ba7fcedd0d1824fcca2
                                              • Instruction Fuzzy Hash: D0F062714043849EE7118E19CC84B73FF98EF81674F18C45AED085B386C3799844CAB1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.446620968.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                                              • Associated: 00000000.00000002.446597112.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.446731038.0000000000F31000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.446838281.0000000000FBC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.446865705.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ee0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 06476d10623bbd92586595be324f93d8640aec92e57b379449d447c4c0b6f14a
                                              • Instruction ID: a7b9682a1565700bf9edbeabb4e951804368d13317ae10979c4b93e15683cbbd
                                              • Opcode Fuzzy Hash: 06476d10623bbd92586595be324f93d8640aec92e57b379449d447c4c0b6f14a
                                              • Instruction Fuzzy Hash: D2E2ED5140E7C58FCB078BB85CB12E17FB5AE6721831E64C7C5C0CF0A7D509A96AE726
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Execution Graph

                                              Execution Coverage:11.1%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:97
                                              Total number of Limit Nodes:5
                                              execution_graph 16818 2ef6758 16821 2ef6344 16818->16821 16820 2ef6766 16822 2ef634f 16821->16822 16825 2ef6394 16822->16825 16824 2ef688d 16824->16820 16826 2ef639f 16825->16826 16829 2ef63c4 16826->16829 16828 2ef6962 16828->16824 16830 2ef63cf 16829->16830 16833 2ef63f4 16830->16833 16832 2ef6a62 16832->16828 16834 2ef63ff 16833->16834 16836 2ef717e 16834->16836 16839 2ef92b9 16834->16839 16835 2ef71bc 16835->16832 16836->16835 16843 2efb3f9 16836->16843 16848 2ef92e1 16839->16848 16852 2ef92f0 16839->16852 16840 2ef92ce 16840->16836 16844 2efb429 16843->16844 16845 2efb44d 16844->16845 16884 2efb5aa 16844->16884 16888 2efb5b8 16844->16888 16845->16835 16856 2ef93d9 16848->16856 16864 2ef93e8 16848->16864 16849 2ef92ff 16849->16840 16853 2ef92ff 16852->16853 16854 2ef93d9 2 API calls 16852->16854 16855 2ef93e8 2 API calls 16852->16855 16853->16840 16854->16853 16855->16853 16857 2ef93fb 16856->16857 16858 2ef9413 16857->16858 16872 2ef9660 16857->16872 16876 2ef9670 16857->16876 16858->16849 16859 2ef940b 16859->16858 16860 2ef9610 GetModuleHandleW 16859->16860 16861 2ef963d 16860->16861 16861->16849 16865 2ef93fb 16864->16865 16867 2ef9413 16865->16867 16870 2ef9660 LoadLibraryExW 16865->16870 16871 2ef9670 LoadLibraryExW 16865->16871 16866 2ef940b 16866->16867 16868 2ef9610 GetModuleHandleW 16866->16868 16867->16849 16869 2ef963d 16868->16869 16869->16849 16870->16866 16871->16866 16873 2ef9670 16872->16873 16875 2ef96a9 16873->16875 16880 2ef8768 16873->16880 16875->16859 16877 2ef9684 16876->16877 16878 2ef96a9 16877->16878 16879 2ef8768 LoadLibraryExW 16877->16879 16878->16859 16879->16878 16881 2ef9850 LoadLibraryExW 16880->16881 16883 2ef98c9 16881->16883 16883->16875 16885 2efb5b2 16884->16885 16887 2efb5ff 16885->16887 16892 2efa0ec 16885->16892 16887->16845 16889 2efb5c5 16888->16889 16890 2efb5ff 16889->16890 16891 2efa0ec 8 API calls 16889->16891 16890->16845 16891->16890 16893 2efa0f7 16892->16893 16895 2efc2f8 16893->16895 16896 2efb904 16893->16896 16895->16895 16897 2efb90f 16896->16897 16898 2ef63f4 8 API calls 16897->16898 16899 2efc367 16898->16899 16908 2efc3d1 16899->16908 16914 2efc3e0 16899->16914 16900 2efc375 16901 2efb914 LoadLibraryExW GetModuleHandleW GetModuleHandleW 16900->16901 16902 2efc38f 16901->16902 16904 2efe0d8 LoadLibraryExW GetModuleHandleW GetModuleHandleW CreateWindowExW CreateWindowExW 16902->16904 16905 2efe0f0 LoadLibraryExW GetModuleHandleW GetModuleHandleW CreateWindowExW CreateWindowExW 16902->16905 16903 2efc3a0 16903->16895 16904->16903 16905->16903 16909 2efc40e 16908->16909 16911 2efc437 16909->16911 16912 2efc4df 16909->16912 16920 2efb9a0 16909->16920 16911->16912 16913 2efc4da KiUserCallbackDispatcher 16911->16913 16913->16912 16915 2efc40e 16914->16915 16916 2efb9a0 GetFocus 16915->16916 16917 2efc437 16915->16917 16919 2efc4df 16915->16919 16916->16917 16918 2efc4da KiUserCallbackDispatcher 16917->16918 16917->16919 16918->16919 16921 2efb9ab 16920->16921 16922 2efba14 GetFocus 16921->16922 16923 2efc9f5 16922->16923 16923->16911 16814 2effe40 SetWindowLongW 16815 2effeac 16814->16815 16816 2efbd00 DuplicateHandle 16817 2efbd96 16816->16817 16924 2efb6d0 GetCurrentProcess 16925 2efb74a GetCurrentThread 16924->16925 16926 2efb743 16924->16926 16927 2efb787 GetCurrentProcess 16925->16927 16928 2efb780 16925->16928 16926->16925 16931 2efb7bd 16927->16931 16928->16927 16929 2efb7e5 GetCurrentThreadId 16930 2efb816 16929->16930 16931->16929

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 02EFB730
                                              • GetCurrentThread.KERNEL32 ref: 02EFB76D
                                              • GetCurrentProcess.KERNEL32 ref: 02EFB7AA
                                              • GetCurrentThreadId.KERNEL32 ref: 02EFB803
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: d5c4703e4cc7246a8f90e143e3f637e21653f8de65b073913d0be404e0124d81
                                              • Instruction ID: 88dc3d4105b00890ad6482ee2cb5678dc3ca3fa5f7e35f2dccedc7d9e10f52f5
                                              • Opcode Fuzzy Hash: d5c4703e4cc7246a8f90e143e3f637e21653f8de65b073913d0be404e0124d81
                                              • Instruction Fuzzy Hash: D15144B49007488FDB54CFAAD589BDEBBF1AB88318F24855EE109B7390CB749845CF61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 02EFB730
                                              • GetCurrentThread.KERNEL32 ref: 02EFB76D
                                              • GetCurrentProcess.KERNEL32 ref: 02EFB7AA
                                              • GetCurrentThreadId.KERNEL32 ref: 02EFB803
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: c67ead8e284fced5ec5b444cd925bd5a20f49bf9190aa3a2d7288bfb12bd3402
                                              • Instruction ID: 0ea12d6781ca42ed957d08242e42fbf00a2bba90cbc4a2e07df23f5aa2bd5861
                                              • Opcode Fuzzy Hash: c67ead8e284fced5ec5b444cd925bd5a20f49bf9190aa3a2d7288bfb12bd3402
                                              • Instruction Fuzzy Hash: 8D5154B0A007488FDB54CFAAD549BDEBBF1AF88308F24855EE109A7390CB745844CF61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 65 2ef93e8-2ef93fd call 2ef8704 68 2ef93ff 65->68 69 2ef9413-2ef9417 65->69 121 2ef9405 call 2ef9660 68->121 122 2ef9405 call 2ef9670 68->122 70 2ef942b-2ef946c 69->70 71 2ef9419-2ef9423 69->71 76 2ef946e-2ef9476 70->76 77 2ef9479-2ef9487 70->77 71->70 72 2ef940b-2ef940d 72->69 74 2ef9548-2ef9608 72->74 114 2ef960a-2ef960d 74->114 115 2ef9610-2ef963b GetModuleHandleW 74->115 76->77 79 2ef94ab-2ef94ad 77->79 80 2ef9489-2ef948e 77->80 83 2ef94b0-2ef94b7 79->83 81 2ef9499 80->81 82 2ef9490-2ef9497 call 2ef8710 80->82 86 2ef949b-2ef94a9 81->86 82->86 87 2ef94b9-2ef94c1 83->87 88 2ef94c4-2ef94cb 83->88 86->83 87->88 90 2ef94cd-2ef94d5 88->90 91 2ef94d8-2ef94e1 call 2ef8720 88->91 90->91 95 2ef94ee-2ef94f3 91->95 96 2ef94e3-2ef94eb 91->96 98 2ef94f5-2ef94fc 95->98 99 2ef9511-2ef9515 95->99 96->95 98->99 100 2ef94fe-2ef950e call 2ef8730 call 2ef8740 98->100 119 2ef9518 call 2ef9968 99->119 120 2ef9518 call 2ef9958 99->120 100->99 103 2ef951b-2ef951e 106 2ef9541-2ef9547 103->106 107 2ef9520-2ef953e 103->107 107->106 114->115 116 2ef963d-2ef9643 115->116 117 2ef9644-2ef9658 115->117 116->117 119->103 120->103 121->72 122->72
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02EF962E
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 03d29a9eff39ba2a33e44f2468250df1ff37ba2792bd7d9d8b50215ae986cb4a
                                              • Instruction ID: 135b481f405b14e66f42b5c4c223c3a1539cd346651bb78e02682b29625aa384
                                              • Opcode Fuzzy Hash: 03d29a9eff39ba2a33e44f2468250df1ff37ba2792bd7d9d8b50215ae986cb4a
                                              • Instruction Fuzzy Hash: 00711570A00B058FDB64DF2AD49575ABBF1BF88318F00892EE586D7A50DB74E845CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 123 2effb20-2effb60 124 2effbc4-2effbd6 123->124 125 2effb62-2effb88 123->125 128 2effbd8 124->128 129 2effbe0 124->129 126 2effbec-2effc5e 125->126 127 2effb8a-2effb93 125->127 133 2effc69-2effc70 126->133 134 2effc60-2effc66 126->134 130 2effbdd-2effbde 128->130 131 2effbd8 call 2efda04 128->131 129->126 131->130 135 2effc7b-2effd1a CreateWindowExW 133->135 136 2effc72-2effc78 133->136 134->133 138 2effd1c-2effd22 135->138 139 2effd23-2effd5b 135->139 136->135 138->139 143 2effd5d-2effd60 139->143 144 2effd68 139->144 143->144 145 2effd69 144->145 145->145
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EFFD0A
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 8cc2898b4c9597ce7f376582abc21ae096a5702d7130cb3bc2dea44c425ce667
                                              • Instruction ID: 8e61cb24822c8a49c1909b6db41289719ee5dd4cc11e4f6f0d3e964b11d848f2
                                              • Opcode Fuzzy Hash: 8cc2898b4c9597ce7f376582abc21ae096a5702d7130cb3bc2dea44c425ce667
                                              • Instruction Fuzzy Hash: AD6135B2C053889FDB15CFA9C891BCEBFB1BF89314F28815AE404AB252D7359845CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 146 2effb98-2effbac 147 2effbae-2effbd8 call 2efda04 146->147 148 2effbe6-2effc5e 146->148 151 2effbdd-2effbde 147->151 153 2effc69-2effc70 148->153 154 2effc60-2effc66 148->154 155 2effc7b-2effd1a CreateWindowExW 153->155 156 2effc72-2effc78 153->156 154->153 158 2effd1c-2effd22 155->158 159 2effd23-2effd5b 155->159 156->155 158->159 163 2effd5d-2effd60 159->163 164 2effd68 159->164 163->164 165 2effd69 164->165 165->165
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EFFD0A
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 4af08957e46561b976869325cff4f850655f63f3e3d571346375921bf3b6c893
                                              • Instruction ID: 974b2532871a177dec70dcc8c9c9ef21da5973bbd9a266689e93194ecfa4d76d
                                              • Opcode Fuzzy Hash: 4af08957e46561b976869325cff4f850655f63f3e3d571346375921bf3b6c893
                                              • Instruction Fuzzy Hash: 565103B2C04349AFDF01CFA9C884ACEBFB1BF49314F18815AE918AB261D7759845CF50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 166 2effbf8-2effc5e 167 2effc69-2effc70 166->167 168 2effc60-2effc66 166->168 169 2effc7b-2effcb3 167->169 170 2effc72-2effc78 167->170 168->167 171 2effcbb-2effd1a CreateWindowExW 169->171 170->169 172 2effd1c-2effd22 171->172 173 2effd23-2effd5b 171->173 172->173 177 2effd5d-2effd60 173->177 178 2effd68 173->178 177->178 179 2effd69 178->179 179->179
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EFFD0A
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: e3fcf32d18b62d21dbafe474981a33526ecd75778046c1999ea15ae8486ae65f
                                              • Instruction ID: f001dea770a682c6c2153d9d5609acb000fe000b3454c577ef4d6775dd53138d
                                              • Opcode Fuzzy Hash: e3fcf32d18b62d21dbafe474981a33526ecd75778046c1999ea15ae8486ae65f
                                              • Instruction Fuzzy Hash: B341C2B1D003199FDF14CF99C884ADEBBB5BF88314F24812AE819AB250D7759845CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 180 2efbcf9-2efbd94 DuplicateHandle 181 2efbd9d-2efbdba 180->181 182 2efbd96-2efbd9c 180->182 182->181
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02EFBD87
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 186a3a044102f6d2c5debe9e2f585ed54827668cbe4ca0a30b496449c98a50fc
                                              • Instruction ID: d1f73b744bf6d515301aa5e4d3db7a249e8cd08a6e46750455729f2ef2cd2ac6
                                              • Opcode Fuzzy Hash: 186a3a044102f6d2c5debe9e2f585ed54827668cbe4ca0a30b496449c98a50fc
                                              • Instruction Fuzzy Hash: 2C2116B59002489FCF10CFA9D584AEEBBF4FB48314F14841AE914B3310C375A944CF61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 185 2efbd00-2efbd94 DuplicateHandle 186 2efbd9d-2efbdba 185->186 187 2efbd96-2efbd9c 185->187 187->186
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02EFBD87
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 791afa27475c6fb78338e83ad4b072a08b5918bf11561ead8ac35a526652d417
                                              • Instruction ID: b7678706b1178e4d411be3a22e9eec0a2feab677f382fb102cc584cebedbb477
                                              • Opcode Fuzzy Hash: 791afa27475c6fb78338e83ad4b072a08b5918bf11561ead8ac35a526652d417
                                              • Instruction Fuzzy Hash: B821D3B59003489FDB10CFAAD984ADEBFF8FB48324F14841AE914A7310D379A954DFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 190 2ef8768-2ef9890 192 2ef9898-2ef98c7 LoadLibraryExW 190->192 193 2ef9892-2ef9895 190->193 194 2ef98c9-2ef98cf 192->194 195 2ef98d0-2ef98ed 192->195 193->192 194->195
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02EF96A9,00000800,00000000,00000000), ref: 02EF98BA
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: dc44f9f137bb40058110b473881dd74c40684af99cb3cb336d224c6e68b1b2bf
                                              • Instruction ID: a3e2544a970f24ac733a26be6683a241bbf3ffe31ad6325a8fd66d106c45a718
                                              • Opcode Fuzzy Hash: dc44f9f137bb40058110b473881dd74c40684af99cb3cb336d224c6e68b1b2bf
                                              • Instruction Fuzzy Hash: CB1100B69043498FCB10CF9AC444BDEBBF4EB88324F14842EE959A7600C375A945CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 198 2ef9849-2ef9890 200 2ef9898-2ef98c7 LoadLibraryExW 198->200 201 2ef9892-2ef9895 198->201 202 2ef98c9-2ef98cf 200->202 203 2ef98d0-2ef98ed 200->203 201->200 202->203
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02EF96A9,00000800,00000000,00000000), ref: 02EF98BA
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: a3ccbe1a29137a3da8823abbbeeb042243b1390c94289ef738357e0790ce682c
                                              • Instruction ID: 550a260cf369ce1e573f346640fecb94416c8b7f44c79862cb590d35e79b395e
                                              • Opcode Fuzzy Hash: a3ccbe1a29137a3da8823abbbeeb042243b1390c94289ef738357e0790ce682c
                                              • Instruction Fuzzy Hash: A01100B69003499FDB10CF9AD844BDEBBF4AB88324F14842EE915A7600C778A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 206 2ef95c8-2ef9608 207 2ef960a-2ef960d 206->207 208 2ef9610-2ef963b GetModuleHandleW 206->208 207->208 209 2ef963d-2ef9643 208->209 210 2ef9644-2ef9658 208->210 209->210
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02EF962E
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 8e83a5cee859730aed3176d70a6d90b4f0b37b11784ac586b3ce6bf5a847cfc9
                                              • Instruction ID: 00b82f805f93caaa7b6e56c80625931404da42cbd31af4800cb849564621c76d
                                              • Opcode Fuzzy Hash: 8e83a5cee859730aed3176d70a6d90b4f0b37b11784ac586b3ce6bf5a847cfc9
                                              • Instruction Fuzzy Hash: DD11E0B5D007898FCB10CF9AD444BDFFBF4AB88228F15C45AD959A7600C379A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 212 2effe38-2effe3b 213 2effe40-2effeaa SetWindowLongW 212->213 214 2effeac-2effeb2 213->214 215 2effeb3-2effec7 213->215 214->215
                                              APIs
                                              • SetWindowLongW.USER32(?,?,?), ref: 02EFFE9D
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: LongWindow
                                              • String ID:
                                              • API String ID: 1378638983-0
                                              • Opcode ID: 396238890256b463175f45dbb883e39b54065a113638a3213b05fd16dffda9e9
                                              • Instruction ID: 839e83d1e8fce5f3b40cc6a5824d87e358eddf5b7d633865fcdfdb65647885f7
                                              • Opcode Fuzzy Hash: 396238890256b463175f45dbb883e39b54065a113638a3213b05fd16dffda9e9
                                              • Instruction Fuzzy Hash: 6011F2B59002489FDB10CF99D589BDFBBF8EB88324F14845AE919B3740D378A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 217 2effe40-2effeaa SetWindowLongW 218 2effeac-2effeb2 217->218 219 2effeb3-2effec7 217->219 218->219
                                              APIs
                                              • SetWindowLongW.USER32(?,?,?), ref: 02EFFE9D
                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632973186.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_2ef0000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID: LongWindow
                                              • String ID:
                                              • API String ID: 1378638983-0
                                              • Opcode ID: 3131259569d33170adb2f21e442e9884f2eb218404f4a70ceb39a7e2c3c82c17
                                              • Instruction ID: 80049699a540b5fb223d02b2d74d89a16a291eb65b260280dab1d3c2bc8d48a6
                                              • Opcode Fuzzy Hash: 3131259569d33170adb2f21e442e9884f2eb218404f4a70ceb39a7e2c3c82c17
                                              • Instruction Fuzzy Hash: 0C1100B59002488FDB20CF99D589BDFBBF8EB88324F14845AD919A3740D374A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632519169.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_13dd000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6863d01d3c1c8b3aaea47345dfcdc03dbb7012e7f7af62fccad25cbffe40547
                                              • Instruction ID: 1e52a9d211c4b3247a529aac59738e7d4efc5f93c21e1f72847f1ec3bf128783
                                              • Opcode Fuzzy Hash: b6863d01d3c1c8b3aaea47345dfcdc03dbb7012e7f7af62fccad25cbffe40547
                                              • Instruction Fuzzy Hash: 662128B2504244DFDB11DF94E9C0F26BF66FB8432CF248569E9054B296C336D855C7A1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632561316.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_13ed000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f2117defd636b4498ed69c26ea68c813fb2b4545cc6af4dd494f8faf217b25a9
                                              • Instruction ID: 9921a71e2a0476ab12daeb9dce0d151809e2fe93aea4ba409589ea33e371c7a0
                                              • Opcode Fuzzy Hash: f2117defd636b4498ed69c26ea68c813fb2b4545cc6af4dd494f8faf217b25a9
                                              • Instruction Fuzzy Hash: D8212571608304DFCB11CF54D9C8B26BFA5FB84358F28C569D9094B686C336DC46CA61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632519169.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_13dd000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c702fd562b5f93e8e4b2e9ff7baf791e5e7de14944204115b6362cb0f0e05a08
                                              • Instruction ID: 15d1b567377f173f4674f69203c9a75c7ee1cbd150b934c07a1dabca689691c4
                                              • Opcode Fuzzy Hash: c702fd562b5f93e8e4b2e9ff7baf791e5e7de14944204115b6362cb0f0e05a08
                                              • Instruction Fuzzy Hash: CD11B176904280DFDB12CF54D9C4B16BF72FB84328F24C6A9D9050B657C336D45ACBA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 0000000D.00000002.632561316.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_13_2_13ed000_qs5yhVj1bE.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6d8453f2856e9fffd06841d27046e1044311c887d38c2cdc4125c35467cc6d87
                                              • Instruction ID: dbe5a13197ab829b4f0be152bc98a1c06924facb93441b1ee9c559c362fa5bee
                                              • Opcode Fuzzy Hash: 6d8453f2856e9fffd06841d27046e1044311c887d38c2cdc4125c35467cc6d87
                                              • Instruction Fuzzy Hash: F0119075504384DFDB12CF54D5C4B15FFA1FB44318F28C6A9D8494B696C33AD84ACB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%