Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qs5yhVj1bE.exe

Overview

General Information

Sample Name:qs5yhVj1bE.exe
Analysis ID:623785
MD5:fc38c021fb2a8c4d49b9f3e3fd91b03b
SHA1:f790e60e1a48a0faf5c311ee8c882f6d08653490
SHA256:af66baeaeaf66b03d22bfba26cfaff343489fdf3eccb9e6078017c93fd6155c5
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • qs5yhVj1bE.exe (PID: 6204 cmdline: "C:\Users\user\Desktop\qs5yhVj1bE.exe" MD5: FC38C021FB2A8C4D49B9F3E3FD91B03B)
    • powershell.exe (PID: 6664 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5580 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • qs5yhVj1bE.exe (PID: 4128 cmdline: C:\Users\user\Desktop\qs5yhVj1bE.exe MD5: FC38C021FB2A8C4D49B9F3E3FD91B03B)
    • qs5yhVj1bE.exe (PID: 6464 cmdline: C:\Users\user\Desktop\qs5yhVj1bE.exe MD5: FC38C021FB2A8C4D49B9F3E3FD91B03B)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "6d38b3f5-33a1-41b7-a7f2-d8fe2b39", "Group": "happy man", "Domain1": "91.193.75.221", "Domain2": "", "Port": 4040, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 31 entries
        SourceRuleDescriptionAuthorStrings
        13.2.qs5yhVj1bE.exe.4064545.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0x23c28:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        • 0x23c55:$x2: IClientNetworkHost
        13.2.qs5yhVj1bE.exe.4064545.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xb184:$x2: NanoCore.ClientPluginHost
        • 0x23c28:$x2: NanoCore.ClientPluginHost
        • 0xc25f:$s4: PipeCreated
        • 0x24d03:$s4: PipeCreated
        • 0xb19e:$s5: IClientLoggingHost
        • 0x23c42:$s5: IClientLoggingHost
        13.2.qs5yhVj1bE.exe.4064545.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          13.2.qs5yhVj1bE.exe.4064545.4.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
          • 0xb14f:$x2: NanoCore.ClientPlugin
          • 0x23bf3:$x2: NanoCore.ClientPlugin
          • 0xb184:$x3: NanoCore.ClientPluginHost
          • 0x23c28:$x3: NanoCore.ClientPluginHost
          • 0xb143:$i2: IClientData
          • 0x23be7:$i2: IClientData
          • 0xb165:$i3: IClientNetwork
          • 0x23c09:$i3: IClientNetwork
          • 0xb174:$i5: IClientDataHost
          • 0x23c18:$i5: IClientDataHost
          • 0xb19e:$i6: IClientLoggingHost
          • 0x23c42:$i6: IClientLoggingHost
          • 0xb1b1:$i7: IClientNetworkHost
          • 0x23c55:$i7: IClientNetworkHost
          • 0xb1c4:$i8: IClientUIHost
          • 0x23c68:$i8: IClientUIHost
          • 0xb1d2:$i9: IClientNameObjectCollection
          • 0x23c76:$i9: IClientNameObjectCollection
          • 0xb1ee:$i10: IClientReadOnlyNameObjectCollection
          • 0x23c92:$i10: IClientReadOnlyNameObjectCollection
          • 0xaf41:$s1: ClientPlugin
          13.2.qs5yhVj1bE.exe.6280000.9.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xd9ad:$x1: NanoCore.ClientPluginHost
          • 0xd9da:$x2: IClientNetworkHost
          Click to see the 83 entries

          AV Detection

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\qs5yhVj1bE.exe, ProcessId: 6464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\qs5yhVj1bE.exe, ProcessId: 6464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Stealing of Sensitive Information

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\qs5yhVj1bE.exe, ProcessId: 6464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\qs5yhVj1bE.exe, ProcessId: 6464, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6d38b3f5-33a1-41b7-a7f2-d8fe2b39", "Group": "happy man", "Domain1": "91.193.75.221", "Domain2": "", "Port": 4040, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Source: qs5yhVj1bE.exeVirustotal: Detection: 34%Perma Link
          Source: qs5yhVj1bE.exeReversingLabs: Detection: 29%
          Source: 91.193.75.221Avira URL Cloud: Label: malware
          Source: C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exeReversingLabs: Detection: 29%
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTR
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpackAvira: Label: TR/NanoCore.fadte
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: qs5yhVj1bE.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: qs5yhVj1bE.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\nZeryYFdTA\src\obj\Debug\UnicodeDataHea.pdb source: qs5yhVj1bE.exe, KwPaVQtTrKa.exe.0.dr

          Networking

          barindex
          Source: Malware configuration extractorURLs:
          Source: Malware configuration extractorURLs: 91.193.75.221
          Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
          Source: global trafficTCP traffic: 192.168.2.6:49774 -> 91.193.75.221:4040
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: unknownTCP traffic detected without corresponding DNS query: 91.193.75.221
          Source: qs5yhVj1bE.exe, 00000000.00000003.370291562.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369206464.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369131356.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369375880.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370179857.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369698046.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370266592.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369541182.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370024384.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369479149.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.368888065.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370223537.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369077914.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369916443.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: qs5yhVj1bE.exe, 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wQ.I
          Source: qs5yhVj1bE.exe, 00000000.00000003.373475035.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373356806.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
          Source: qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comies
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comis
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comk
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml-g
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comlt
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
          Source: qs5yhVj1bE.exe, 00000000.00000003.387245059.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.446159972.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.452696202.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386360473.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386208471.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378031583.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.377989464.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.387051919.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386016328.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTF:.
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmll
          Source: qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlX
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/y.
          Source: qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
          Source: qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comM.TTFr.
          Source: qs5yhVj1bE.exe, 00000000.00000003.377989464.000000000627C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comTTF
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378080948.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378185589.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
          Source: qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomd
          Source: qs5yhVj1bE.exe, 00000000.00000003.380742013.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380823173.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380595770.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381091108.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380965210.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd(.
          Source: qs5yhVj1bE.exe, 00000000.00000003.387245059.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386360473.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386208471.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.387051919.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386016328.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdiaa
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdr.
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comme
          Source: qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsiva
          Source: qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueo.
          Source: qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comy.
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.373475035.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372318130.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372664402.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372819929.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373111381.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372996469.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373356806.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372891186.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373222995.0000000006284000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: qs5yhVj1bE.exe, 00000000.00000003.372158589.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372219053.0000000006284000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cncz
          Source: qs5yhVj1bE.exe, 00000000.00000003.372158589.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372219053.0000000006284000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnn-u
          Source: qs5yhVj1bE.exe, 00000000.00000003.372318130.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372664402.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372819929.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372996469.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372891186.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnsk
          Source: qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
          Source: qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/:.
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/X9
          Source: qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381915896.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382455154.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382220533.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382367232.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382139822.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381731140.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr-u:-
          Source: qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376223845.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376663531.000000000627E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/H
          Source: qs5yhVj1bE.exe, 00000000.00000003.374831674.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374882075.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/K.
          Source: qs5yhVj1bE.exe, 00000000.00000003.376124083.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376302609.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376779928.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376223845.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376663531.000000000627E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/U.
          Source: qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/V.
          Source: qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
          Source: qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0H
          Source: qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/K.
          Source: qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/y.
          Source: qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/l19
          Source: qs5yhVj1bE.exe, 00000000.00000003.374831674.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374882075.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vno
          Source: qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
          Source: qs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com&
          Source: qs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comte
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com-u
          Source: qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comc
          Source: qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comd
          Source: qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: qs5yhVj1bE.exe, 00000000.00000003.371821148.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371862519.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371946786.0000000006283000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krb-
          Source: qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krma
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comic
          Source: qs5yhVj1bE.exe, 00000000.00000003.373045408.000000000193C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comn-u
          Source: qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comnt
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.377725754.000000000627C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
          Source: qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnL
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnk
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
          Source: qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.h=
          Source: qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cns-e
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTR

          System Summary

          barindex
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: qs5yhVj1bE.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.5950000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.30586b8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 0_2_00EE2050
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 11_2_00062050
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 13_2_02EFE480
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 13_2_02EFE471
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 13_2_02EFBBD4
          Source: qs5yhVj1bE.exe, 00000000.00000003.407386701.0000000007907000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 00000000.00000000.361404444.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 00000000.00000003.406659892.0000000004344000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 00000000.00000002.454801476.0000000007CA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000B.00000002.428177168.000000000014D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000000.432436987.0000000000D1D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.633039041.0000000003011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exeBinary or memory string: OriginalFilenameUnicodeDataHea.exeD vs qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: qs5yhVj1bE.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: KwPaVQtTrKa.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: KwPaVQtTrKa.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: qs5yhVj1bE.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: KwPaVQtTrKa.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: qs5yhVj1bE.exeVirustotal: Detection: 34%
          Source: qs5yhVj1bE.exeReversingLabs: Detection: 29%
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile read: C:\Users\user\Desktop\qs5yhVj1bE.exeJump to behavior
          Source: qs5yhVj1bE.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe "C:\Users\user\Desktop\qs5yhVj1bE.exe"
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile created: C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exeJump to behavior
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8FC.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@11/9@0/1
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: qs5yhVj1bE.exe, 00000000.00000002.446620968.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, qs5yhVj1bE.exe, 0000000B.00000000.425122552.0000000000062000.00000002.00000001.01000000.00000003.sdmp, qs5yhVj1bE.exe, 0000000D.00000000.430711479.0000000000C32000.00000002.00000001.01000000.00000003.sdmp, KwPaVQtTrKa.exe.0.drBinary or memory string: SELECT TOP 1 FirstDate FROM OrderData WHERE `Order`="{0}" ORDER BY FirstDate ASCmUPDATE OrderData SET PINCode="{1}" WHERE PINCode="{0}"ACREATE DATABASE `{0}`; USE `{0}`
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6d38b3f5-33a1-41b7-a7f2-d8fe2b391c1c}
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeMutant created: \Sessions\1\BaseNamedObjects\bmFsaVVjlnNanGxhNnPYiKsN
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3980:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6004:120:WilError_01
          Source: qs5yhVj1bE.exeString found in binary or memory: note-add
          Source: qs5yhVj1bE.exeString found in binary or memory: user-add
          Source: qs5yhVj1bE.exeString found in binary or memory: <!--StartFragment -->
          Source: qs5yhVj1bE.exeString found in binary or memory: user-add
          Source: qs5yhVj1bE.exeString found in binary or memory: note-add
          Source: qs5yhVj1bE.exeString found in binary or memory: <!--StartFragment -->
          Source: qs5yhVj1bE.exeString found in binary or memory: note-add
          Source: qs5yhVj1bE.exeString found in binary or memory: user-add
          Source: qs5yhVj1bE.exeString found in binary or memory: <!--StartFragment -->
          Source: qs5yhVj1bE.exeString found in binary or memory: user-add
          Source: qs5yhVj1bE.exeString found in binary or memory: note-add
          Source: qs5yhVj1bE.exeString found in binary or memory: <<<<<<<3+<!--StartFragment -->
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: qs5yhVj1bE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: qs5yhVj1bE.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: qs5yhVj1bE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\nZeryYFdTA\src\obj\Debug\UnicodeDataHea.pdb source: qs5yhVj1bE.exe, KwPaVQtTrKa.exe.0.dr

          Data Obfuscation

          barindex
          Source: qs5yhVj1bE.exe, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: KwPaVQtTrKa.exe.0.dr, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.2.qs5yhVj1bE.exe.ee0000.0.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 11.0.qs5yhVj1bE.exe.60000.1.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 11.0.qs5yhVj1bE.exe.60000.3.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 11.0.qs5yhVj1bE.exe.60000.0.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 11.2.qs5yhVj1bE.exe.60000.0.unpack, JobClock/frmJobClock.cs.Net Code: WWWWWWWWWWWWWWWWWWW System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeCode function: 0_2_016EE6F0 pushad ; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.34529223724
          Source: initial sampleStatic PE information: section name: .text entropy: 7.34529223724
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile created: C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeFile opened: C:\Users\user\Desktop\qs5yhVj1bE.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: qs5yhVj1bE.exe, 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: qs5yhVj1bE.exe, 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exe TID: 6180Thread sleep time: -45733s >= -30000s
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exe TID: 6452Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5992Thread sleep time: -10145709240540247s >= -30000s
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exe TID: 6952Thread sleep time: -21213755684765971s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7079
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1621
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeWindow / User API: threadDelayed 4595
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeWindow / User API: threadDelayed 4949
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeWindow / User API: foregroundWindowGot 737
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 45733
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeThread delayed: delay time: 922337203685477
          Source: qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: qs5yhVj1bE.exe, 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeMemory written: C:\Users\user\Desktop\qs5yhVj1bE.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exe
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeProcess created: C:\Users\user\Desktop\qs5yhVj1bE.exe C:\Users\user\Desktop\qs5yhVj1bE.exe
          Source: qs5yhVj1bE.exe, 0000000D.00000002.633125756.000000000307D000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 0000000D.00000002.635689127.00000000063DD000.00000004.00000010.00020000.00000000.sdmp, qs5yhVj1bE.exe, 0000000D.00000002.635858737.000000000661E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635498905.000000000618B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program ManagerX
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Users\user\Desktop\qs5yhVj1bE.exe VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Users\user\Desktop\qs5yhVj1bE.exe VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\qs5yhVj1bE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: qs5yhVj1bE.exe, 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000002.633039041.0000000003011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000002.633039041.0000000003011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: qs5yhVj1bE.exe, 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: qs5yhVj1bE.exe, 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.4064545.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405b0e6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.44d2350.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6284629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.0.qs5yhVj1bE.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.405ff1c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.qs5yhVj1bE.exe.6280000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.449f930.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.qs5yhVj1bE.exe.4461b10.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6204, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qs5yhVj1bE.exe PID: 6464, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Command and Scripting Interpreter
          1
          Scheduled Task/Job
          112
          Process Injection
          1
          Masquerading
          11
          Input Capture
          21
          Security Software Discovery
          Remote Services11
          Input Capture
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Scheduled Task/Job
          Boot or Logon Initialization Scripts1
          Scheduled Task/Job
          11
          Disable or Modify Tools
          LSASS Memory2
          Process Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Non-Standard Port
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
          Virtualization/Sandbox Evasion
          Security Account Manager21
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Remote Access Software
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer1
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Hidden Files and Directories
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common2
          Obfuscated Files or Information
          Cached Domain Credentials12
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items13
          Software Packing
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          qs5yhVj1bE.exe35%VirustotalBrowse
          qs5yhVj1bE.exe29%ReversingLabsByteCode-MSIL.Spyware.Negasteal
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe29%ReversingLabsByteCode-MSIL.Spyware.Negasteal
          SourceDetectionScannerLabelLinkDownload
          13.2.qs5yhVj1bE.exe.6280000.9.unpack100%AviraTR/NanoCore.fadteDownload File
          13.0.qs5yhVj1bE.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          13.2.qs5yhVj1bE.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          0.2.qs5yhVj1bE.exe.33c09c0.3.unpack100%AviraHEUR/AGEN.1215515Download File
          13.0.qs5yhVj1bE.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          13.0.qs5yhVj1bE.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          13.0.qs5yhVj1bE.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          13.0.qs5yhVj1bE.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          0%Avira URL Cloudsafe
          http://www.tiro.comnt0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.fontbureau.comdr.0%Avira URL Cloudsafe
          http://www.fontbureau.comy.0%Avira URL Cloudsafe
          http://www.carterandcone.comis0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/V.0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.carterandcone.coml-g0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/:.0%Avira URL Cloudsafe
          http://www.fontbureau.comTTF0%URL Reputationsafe
          http://www.fontbureau.comessed0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          91.193.75.221100%Avira URL Cloudmalware
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.zhongyicts.com.cno.h=0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.fontbureau.comd(.0%Avira URL Cloudsafe
          http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
          http://www.founder.com.cn/cnn-u0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.fontbureau.comM.TTFr.0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/U.0%Avira URL Cloudsafe
          http://www.sakkal.comd0%Avira URL Cloudsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.sakkal.comc0%Avira URL Cloudsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.galapagosdesign.com/X90%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/y.0%Avira URL Cloudsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fontbureau.com.TTF:.0%Avira URL Cloudsafe
          http://www.fontbureau.comueo.0%Avira URL Cloudsafe
          http://www.fontbureau.comsiva0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y0H0%Avira URL Cloudsafe
          http://www.fontbureau.comF0%URL Reputationsafe
          http://www.sajatypeworks.comte0%Avira URL Cloudsafe
          http://www.sandoll.co.krb-0%Avira URL Cloudsafe
          http://wQ.I0%Avira URL Cloudsafe
          http://www.fontbureau.comcomd0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/vno0%URL Reputationsafe
          http://www.fontbureau.comme0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/K.0%Avira URL Cloudsafe
          http://www.carterandcone.comlt0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/H0%URL Reputationsafe
          http://www.goodfont.co.kr-u:-0%Avira URL Cloudsafe
          http://www.founder.com.cn/cncz0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.fontbureau.coma0%URL Reputationsafe
          http://www.fontbureau.comd0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.zhongyicts.com.cns-e0%Avira URL Cloudsafe
          http://www.carterandcone.comk0%URL Reputationsafe
          http://www.sandoll.co.krma0%Avira URL Cloudsafe
          http://www.zhongyicts.com.cnk0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.sakkal.com-u0%Avira URL Cloudsafe
          http://www.tiro.comn-u0%URL Reputationsafe
          http://www.monotype.0%URL Reputationsafe
          http://www.fontbureau.comdiaa0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/l190%Avira URL Cloudsafe
          http://www.zhongyicts.com.cno.0%URL Reputationsafe
          http://www.founder.com.cn/cnsk0%Avira URL Cloudsafe
          http://www.sajatypeworks.com&0%Avira URL Cloudsafe
          http://www.tiro.comic0%URL Reputationsafe
          http://www.carterandcone.comies0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/K.0%Avira URL Cloudsafe
          http://www.zhongyicts.com.cnL0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          true
          • Avira URL Cloud: safe
          low
          91.193.75.221true
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.fontbureau.com/designersGqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.com/designers/?qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.tiro.comntqs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/bTheqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comdr.qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.comy.qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.carterandcone.comisqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/V.qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.comqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.coml-gqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.galapagosdesign.com/:.qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designersqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comTTFqs5yhVj1bE.exe, 00000000.00000003.377989464.000000000627C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comessedqs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.goodfont.co.krqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comqs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comqs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cn/cTheqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmqs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381915896.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382455154.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382220533.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382367232.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.382139822.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381731140.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.comqs5yhVj1bE.exe, 00000000.00000003.370291562.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369206464.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369131356.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369375880.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370179857.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369698046.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370266592.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369541182.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370024384.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369479149.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.368888065.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.370223537.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369077914.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.369916443.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.zhongyicts.com.cno.h=qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.galapagosdesign.com/DPleaseqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/Y0qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comd(.qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.ascendercorp.com/typedesigners.htmlqs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cnn-uqs5yhVj1bE.exe, 00000000.00000003.372158589.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372219053.0000000006284000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fonts.comqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.sandoll.co.krqs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comM.TTFr.qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/U.qs5yhVj1bE.exe, 00000000.00000003.376124083.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376302609.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376779928.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376223845.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376663531.000000000627E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sakkal.comdqs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.deDPleaseqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sakkal.comcqs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.deqs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.377725754.000000000627C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnqs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameqs5yhVj1bE.exe, 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.carterandcone.como.qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/X9qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/y.qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sakkal.comqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com.TTF:.qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.fontbureau.comueo.qs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comsivaqs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0qs5yhVj1bE.exe, 00000000.00000003.373475035.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373356806.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comqs5yhVj1bE.exe, 00000000.00000003.387245059.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.446159972.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.452696202.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386360473.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386208471.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378031583.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.377989464.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.387051919.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386016328.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.galapagosdesign.com/qs5yhVj1bE.exe, 00000000.00000003.381660285.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmllqs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379240529.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/Y0Hqs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comFqs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comteqs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sandoll.co.krb-qs5yhVj1bE.exe, 00000000.00000003.371821148.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371862519.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.371946786.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://wQ.Iqs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comcomdqs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/vnoqs5yhVj1bE.exe, 00000000.00000003.374831674.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374882075.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.commeqs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378599132.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/K.qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.carterandcone.comltqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmlXqs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/Hqs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375025623.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.goodfont.co.kr-u:-qs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://www.founder.com.cn/cnczqs5yhVj1bE.exe, 00000000.00000003.372158589.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372219053.0000000006284000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comaqs5yhVj1bE.exe, 00000000.00000003.378425306.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378281094.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378509002.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378080948.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378185589.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comdqs5yhVj1bE.exe, 00000000.00000003.380742013.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380823173.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380595770.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.381091108.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380965210.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379437300.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379580791.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379339778.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comlqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cns-eqs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.carterandcone.comkqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sandoll.co.krmaqs5yhVj1bE.exe, 00000000.00000003.371726024.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.zhongyicts.com.cnkqs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNqs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cnqs5yhVj1bE.exe, 00000000.00000003.373475035.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374231374.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372318130.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372664402.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374321375.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372819929.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373111381.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372996469.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373356806.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372891186.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373222995.0000000006284000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmlqs5yhVj1bE.exe, 00000000.00000003.378852412.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379119351.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378776895.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378692656.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.378969033.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sakkal.com-uqs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.tiro.comn-uqs5yhVj1bE.exe, 00000000.00000003.373045408.000000000193C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/y.qs5yhVj1bE.exe, 00000000.00000003.380356730.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379695775.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.380126839.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.379982193.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.monotype.qs5yhVj1bE.exe, 00000000.00000003.380503282.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comdiaaqs5yhVj1bE.exe, 00000000.00000003.387245059.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.385914292.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386360473.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386208471.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.387051919.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.386016328.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376223845.000000000627E000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376663531.000000000627E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/l19qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375210217.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375328444.0000000006281000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.zhongyicts.com.cno.qs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8qs5yhVj1bE.exe, 00000000.00000002.453379491.0000000007472000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnskqs5yhVj1bE.exe, 00000000.00000003.372318130.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372664402.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372819929.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372553156.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372996469.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.372891186.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.sajatypeworks.com&qs5yhVj1bE.exe, 00000000.00000003.366956644.0000000006262000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      low
                                      http://www.tiro.comicqs5yhVj1bE.exe, 00000000.00000003.374108445.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comiesqs5yhVj1bE.exe, 00000000.00000003.373938863.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373829358.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374007038.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374045393.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373756158.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.373717520.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.jiyu-kobo.co.jp/K.qs5yhVj1bE.exe, 00000000.00000003.374831674.000000000627B000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374882075.000000000627C000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375455751.0000000006281000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375908225.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375601870.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375402218.0000000006282000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.376076223.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375997205.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375872751.0000000006283000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.375829861.0000000006280000.00000004.00000800.00020000.00000000.sdmp, qs5yhVj1bE.exe, 00000000.00000003.374959965.0000000006283000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.zhongyicts.com.cnLqs5yhVj1bE.exe, 00000000.00000003.373532036.000000000627B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      91.193.75.221
                                      unknownSerbia
                                      209623DAVID_CRAIGGGtrue
                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                      Analysis ID:623785
                                      Start date and time: 10/05/202220:20:332022-05-10 20:20:33 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 13m 7s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:qs5yhVj1bE.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:24
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@11/9@0/1
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HDC Information:
                                      • Successful, ratio: 0.2% (good quality ratio 0.1%)
                                      • Quality average: 44.4%
                                      • Quality standard deviation: 22.1%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                      • TCP Packets have been reduced to 100
                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                      • Execution Graph export aborted for target qs5yhVj1bE.exe, PID 4128 because there are no executed function
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      20:22:00API Interceptor672x Sleep call for process: qs5yhVj1bE.exe modified
                                      20:22:09API Interceptor40x Sleep call for process: powershell.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):1308
                                      Entropy (8bit):5.345811588615766
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):22192
                                      Entropy (8bit):5.602492204353924
                                      Encrypted:false
                                      SSDEEP:384:ktCDL+wpnO2coZyc0WoQCzmuOMSB+AjultIM47nvHg3hInQML+KfmAV7N4KWyiZh:h42BEcdogM4pClt/k66LKOpJW+4
                                      MD5:B4AA5769644239915B226E839F307C1E
                                      SHA1:ADC45F2262390A555CD93EBD2ABF22ECC83CE393
                                      SHA-256:55B7922DDBF4A8588028D11B837EA5182EE702439381A1DC3D8096CF633F6020
                                      SHA-512:417EDABD8221B67F918EB4A5EC3BCEAEF1DFE85A06E30FD172037E98ACA10BD54824A13C1C9F6EBCF1B41B922F6B6C792DF885EAB5D2EE93045296CA2BA3C293
                                      Malicious:false
                                      Reputation:low
                                      Preview:@...e...........d.......J...C.9.6.....c...-..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:1
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      File Type:XML 1.0 document, ASCII text
                                      Category:dropped
                                      Size (bytes):1610
                                      Entropy (8bit):5.120231854259472
                                      Encrypted:false
                                      SSDEEP:24:2di4+S2qh/S1K2ky1mo2dUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtLoFxvn:cgea6YrFdOFzOzN33ODOiDdKrsuTMv
                                      MD5:922336D1203B1BD3F7EB9FCF816A3E9D
                                      SHA1:D0D9EF055CCD5DFEDD721BC8A433F7C3385E5BC2
                                      SHA-256:EE83E380DA94FD5E09892592631E632EC66975C345A44FA277CEFD5CF52E3A45
                                      SHA-512:2F9453E7524C16E9C117F3EE6A3CBA78B2DE3ACD70AB2E76B3F11453F0935FF5637F6BBD767D6C6391534E36B286FD830BB90E5AED7018972B3AF0CA9613F277
                                      Malicious:true
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailab
                                      Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):8
                                      Entropy (8bit):3.0
                                      Encrypted:false
                                      SSDEEP:3:gn:g
                                      MD5:977AD6A31C19E67C11F89EC07FED7169
                                      SHA1:90ABADF2D64F2ACBB88BE7BD4B665666457880D0
                                      SHA-256:37B518D9943E2B65C745D0BB19E1D0705780AE58731E78C7E0D3DE49F2DE5DC5
                                      SHA-512:D467D520118A9CC22035747153318E8FFD3336E3C0976A33CF82ABC3F86CE09B491E4218E7592ED9FDFA0C040883C886B02B66E4F1E201C077F5B87A6B949B16
                                      Malicious:true
                                      Preview:.F.w.2.H
                                      Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):977920
                                      Entropy (8bit):7.143270648209935
                                      Encrypted:false
                                      SSDEEP:12288:2TcmYDfxt7J0Acp6R8gNtyRAtwPYbfxueUdzWNGpfaz6LSTL:2K2yQdmJueQUoLS
                                      MD5:FC38C021FB2A8C4D49B9F3E3FD91B03B
                                      SHA1:F790E60E1A48A0FAF5C311EE8C882F6D08653490
                                      SHA-256:AF66BAEAEAF66B03D22BFBA26CFAFF343489FDF3ECCB9E6078017C93FD6155C5
                                      SHA-512:B4DD0AC7BAB3E95116F628CD858451E1C13720FC3D610CB5E7DCACFE9968B5506553EFBCB55011B12AA2C524D4B6810013ACDA2E9BB5BF411980B19AF59606C4
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 29%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...S.yb..............0......\........... ........@.. .......................@............@.....................................O........W................... ......t................................................ ............... ..H............text........ ...................... ..`.rsrc....W.......X..................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:false
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):5823
                                      Entropy (8bit):5.375421041469728
                                      Encrypted:false
                                      SSDEEP:96:BZ4TLTN3aqDo1ZSZjTLTN3aqDo1ZWpXBjZMTLTN3aqDo1Z4oRRKZN:7
                                      MD5:64AF3EC2423BC370715C5AD9F14EE9F3
                                      SHA1:3D6753009373C44CF9C6B064D549173FAA9D1482
                                      SHA-256:AFE2B3927B15784A704D2A8AF642C5E62FA15A7A310006DA12835FEC40FED108
                                      SHA-512:7FED25F18036C958DE2B6D561C8A87B8FB292B9ACB365319B98A98400B03E514BF625C4A8472A7CBECF7E376C2B3873F9DE04972C8530DF5F438F7F2FD0D3967
                                      Malicious:false
                                      Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510202208..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 585948 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe..Process ID: 6664..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510202208..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe..**********************..Windows PowerShell transcript start..Start time: 20220510202551..Username: computer\user..RunAs User: DES
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.143270648209935
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:qs5yhVj1bE.exe
                                      File size:977920
                                      MD5:fc38c021fb2a8c4d49b9f3e3fd91b03b
                                      SHA1:f790e60e1a48a0faf5c311ee8c882f6d08653490
                                      SHA256:af66baeaeaf66b03d22bfba26cfaff343489fdf3eccb9e6078017c93fd6155c5
                                      SHA512:b4dd0ac7bab3e95116f628cd858451e1c13720fc3d610cb5e7dcacfe9968b5506553efbcb55011b12aa2c524d4b6810013acda2e9bb5bf411980b19af59606c4
                                      SSDEEP:12288:2TcmYDfxt7J0Acp6R8gNtyRAtwPYbfxueUdzWNGpfaz6LSTL:2K2yQdmJueQUoLS
                                      TLSH:86259D1072D8EE99E02912B1D875C5F00731BE09D5B6D60F29997ECE38B33836566F2B
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...S.yb..............0......\........... ........@.. .......................@............@................................
                                      Icon Hash:f274fec6b6c2e00c
                                      Entrypoint:0x4da9fe
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x6279E653 [Tue May 10 04:13:07 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:v4.0.30319
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      sub eax, 3A002000h
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xda9ac0x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xdc0000x15704.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xf20000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xda8740x1c.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xd8a0c0xd8c00False0.718579918181data7.34529223724IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rsrc0xdc0000x157040x15800False0.151628361192data4.00256037561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xf20000xc0x400False0.0234375data0.0446870062539IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0xdc1680x8a8data
                                      RT_ICON0xdca200x568GLS_BINARY_LSB_FIRST
                                      RT_ICON0xdcf980x10828data
                                      RT_ICON0xed7d00x25a8data
                                      RT_ICON0xefd880x10a8data
                                      RT_ICON0xf0e400x468GLS_BINARY_LSB_FIRST
                                      RT_GROUP_ICON0xf12b80x5adata
                                      RT_VERSION0xf13240x3dcdata
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      DescriptionData
                                      Translation0x0000 0x04b0
                                      LegalCopyrightCopyright 2011 BASeCamp Software Solutions
                                      Assembly Version1.4.8.0
                                      InternalNameUnicodeDataHea.exe
                                      FileVersion1.4.8.0
                                      CompanyNameBASeCamp Software Solutions
                                      LegalTrademarks
                                      Comments
                                      ProductNameBASeCamp JobClock
                                      ProductVersion1.4.8.0
                                      FileDescriptionJobClock Administration Applet
                                      OriginalFilenameUnicodeDataHea.exe
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 10, 2022 20:22:25.670742035 CEST497744040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:25.711811066 CEST40404977491.193.75.221192.168.2.6
                                      May 10, 2022 20:22:26.406785011 CEST497744040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:26.447760105 CEST40404977491.193.75.221192.168.2.6
                                      May 10, 2022 20:22:27.099265099 CEST497744040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:27.140232086 CEST40404977491.193.75.221192.168.2.6
                                      May 10, 2022 20:22:31.419179916 CEST497814040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:31.463193893 CEST40404978191.193.75.221192.168.2.6
                                      May 10, 2022 20:22:32.094806910 CEST497814040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:32.135623932 CEST40404978191.193.75.221192.168.2.6
                                      May 10, 2022 20:22:32.705468893 CEST497814040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:32.746371031 CEST40404978191.193.75.221192.168.2.6
                                      May 10, 2022 20:22:37.216985941 CEST497824040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:37.257924080 CEST40404978291.193.75.221192.168.2.6
                                      May 10, 2022 20:22:37.907769918 CEST497824040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:37.948761940 CEST40404978291.193.75.221192.168.2.6
                                      May 10, 2022 20:22:38.595345974 CEST497824040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:38.636367083 CEST40404978291.193.75.221192.168.2.6
                                      May 10, 2022 20:22:42.909444094 CEST497894040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:42.950333118 CEST40404978991.193.75.221192.168.2.6
                                      May 10, 2022 20:22:43.455065966 CEST497894040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:43.495976925 CEST40404978991.193.75.221192.168.2.6
                                      May 10, 2022 20:22:44.001996040 CEST497894040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:44.043122053 CEST40404978991.193.75.221192.168.2.6
                                      May 10, 2022 20:22:48.050414085 CEST497914040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:48.092804909 CEST40404979191.193.75.221192.168.2.6
                                      May 10, 2022 20:22:48.643059969 CEST497914040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:48.684036970 CEST40404979191.193.75.221192.168.2.6
                                      May 10, 2022 20:22:49.252594948 CEST497914040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:49.293675900 CEST40404979191.193.75.221192.168.2.6
                                      May 10, 2022 20:22:53.300666094 CEST497934040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:53.341578007 CEST40404979391.193.75.221192.168.2.6
                                      May 10, 2022 20:22:53.956068039 CEST497934040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:53.996957064 CEST40404979391.193.75.221192.168.2.6
                                      May 10, 2022 20:22:54.643557072 CEST497934040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:54.684783936 CEST40404979391.193.75.221192.168.2.6
                                      May 10, 2022 20:22:58.821120977 CEST497954040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:58.862413883 CEST40404979591.193.75.221192.168.2.6
                                      May 10, 2022 20:22:59.425177097 CEST497954040192.168.2.691.193.75.221
                                      May 10, 2022 20:22:59.466072083 CEST40404979591.193.75.221192.168.2.6
                                      May 10, 2022 20:23:00.112796068 CEST497954040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:00.153745890 CEST40404979591.193.75.221192.168.2.6
                                      May 10, 2022 20:23:04.161305904 CEST497984040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:04.202254057 CEST40404979891.193.75.221192.168.2.6
                                      May 10, 2022 20:23:04.753804922 CEST497984040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:04.794708014 CEST40404979891.193.75.221192.168.2.6
                                      May 10, 2022 20:23:05.456967115 CEST497984040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:05.497823000 CEST40404979891.193.75.221192.168.2.6
                                      May 10, 2022 20:23:09.522205114 CEST497994040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:09.563852072 CEST40404979991.193.75.221192.168.2.6
                                      May 10, 2022 20:23:10.113595009 CEST497994040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:10.155294895 CEST40404979991.193.75.221192.168.2.6
                                      May 10, 2022 20:23:10.723072052 CEST497994040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:10.763861895 CEST40404979991.193.75.221192.168.2.6
                                      May 10, 2022 20:23:14.934631109 CEST498024040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:14.975474119 CEST40404980291.193.75.221192.168.2.6
                                      May 10, 2022 20:23:15.550478935 CEST498024040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:15.591298103 CEST40404980291.193.75.221192.168.2.6
                                      May 10, 2022 20:23:16.159353018 CEST498024040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:16.200304985 CEST40404980291.193.75.221192.168.2.6
                                      May 10, 2022 20:23:22.127484083 CEST498124040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:22.168374062 CEST40404981291.193.75.221192.168.2.6
                                      May 10, 2022 20:23:22.814657927 CEST498124040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:22.855741024 CEST40404981291.193.75.221192.168.2.6
                                      May 10, 2022 20:23:23.422885895 CEST498124040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:23.463851929 CEST40404981291.193.75.221192.168.2.6
                                      May 10, 2022 20:23:27.473067045 CEST498424040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:27.513940096 CEST40404984291.193.75.221192.168.2.6
                                      May 10, 2022 20:23:28.017077923 CEST498424040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:28.057913065 CEST40404984291.193.75.221192.168.2.6
                                      May 10, 2022 20:23:28.563960075 CEST498424040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:28.604878902 CEST40404984291.193.75.221192.168.2.6
                                      May 10, 2022 20:23:32.628253937 CEST498574040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:32.669279099 CEST40404985791.193.75.221192.168.2.6
                                      May 10, 2022 20:23:33.173703909 CEST498574040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:33.214698076 CEST40404985791.193.75.221192.168.2.6
                                      May 10, 2022 20:23:33.720746040 CEST498574040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:33.761704922 CEST40404985791.193.75.221192.168.2.6
                                      May 10, 2022 20:23:37.783387899 CEST498594040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:37.824831009 CEST40404985991.193.75.221192.168.2.6
                                      May 10, 2022 20:23:38.346142054 CEST498594040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:38.387140989 CEST40404985991.193.75.221192.168.2.6
                                      May 10, 2022 20:23:38.928134918 CEST498594040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:38.969187975 CEST40404985991.193.75.221192.168.2.6
                                      May 10, 2022 20:23:42.972807884 CEST498604040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:43.013845921 CEST40404986091.193.75.221192.168.2.6
                                      May 10, 2022 20:23:43.658948898 CEST498604040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:43.699862003 CEST40404986091.193.75.221192.168.2.6
                                      May 10, 2022 20:23:44.324449062 CEST498604040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:44.365216017 CEST40404986091.193.75.221192.168.2.6
                                      May 10, 2022 20:23:48.379189968 CEST498634040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:48.420047998 CEST40404986391.193.75.221192.168.2.6
                                      May 10, 2022 20:23:48.925017118 CEST498634040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:48.966682911 CEST40404986391.193.75.221192.168.2.6
                                      May 10, 2022 20:23:49.472002983 CEST498634040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:49.512907028 CEST40404986391.193.75.221192.168.2.6
                                      May 10, 2022 20:23:53.519812107 CEST498644040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:53.560600996 CEST40404986491.193.75.221192.168.2.6
                                      May 10, 2022 20:23:54.066107035 CEST498644040192.168.2.691.193.75.221
                                      May 10, 2022 20:23:54.106925964 CEST40404986491.193.75.221192.168.2.6

                                      Click to jump to process

                                      Target ID:0
                                      Start time:20:21:41
                                      Start date:10/05/2022
                                      Path:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\qs5yhVj1bE.exe"
                                      Imagebase:0xee0000
                                      File size:977920 bytes
                                      MD5 hash:FC38C021FB2A8C4D49B9F3E3FD91B03B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.448596274.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.449384414.0000000003534000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.450332002.0000000004461000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Reputation:low

                                      Target ID:5
                                      Start time:20:22:04
                                      Start date:10/05/2022
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KwPaVQtTrKa.exe
                                      Imagebase:0xf10000
                                      File size:430592 bytes
                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Target ID:6
                                      Start time:20:22:05
                                      Start date:10/05/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6406f0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:7
                                      Start time:20:22:05
                                      Start date:10/05/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KwPaVQtTrKa" /XML "C:\Users\user\AppData\Local\Temp\tmp8FC.tmp
                                      Imagebase:0xc20000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:8
                                      Start time:20:22:07
                                      Start date:10/05/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6406f0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:11
                                      Start time:20:22:10
                                      Start date:10/05/2022
                                      Path:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      Imagebase:0x60000
                                      File size:977920 bytes
                                      MD5 hash:FC38C021FB2A8C4D49B9F3E3FD91B03B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low

                                      Target ID:13
                                      Start time:20:22:12
                                      Start date:10/05/2022
                                      Path:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\qs5yhVj1bE.exe
                                      Imagebase:0xc30000
                                      File size:977920 bytes
                                      MD5 hash:FC38C021FB2A8C4D49B9F3E3FD91B03B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.444387239.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.437739210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.431483918.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000D.00000000.433933861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.630998796.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.634263840.0000000004059000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000D.00000002.635612339.0000000006280000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000D.00000002.635329054.0000000005950000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low

                                      No disassembly