Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QUOTATION.exe

Overview

General Information

Sample Name:QUOTATION.exe
Analysis ID:624514
MD5:dbffb4682e330d635295ccdd92fe99c4
SHA1:ba03bbac64d96bfbd3067803a8b08466b8fb0d3a
SHA256:011c5f305852ea8ef82a26bae0d7b6f59fd70f431b91edb25df06863e0001bc0
Tags:exeNanoCoreQuotation
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • QUOTATION.exe (PID: 636 cmdline: "C:\Users\user\Desktop\QUOTATION.exe" MD5: DBFFB4682E330D635295CCDD92FE99C4)
    • QUOTATION.exe (PID: 1052 cmdline: C:\Users\user\Desktop\QUOTATION.exe MD5: DBFFB4682E330D635295CCDD92FE99C4)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "fe56abb4-cb76-44f1-89b4-7bb11730", "Group": "Default", "Domain1": "deranano2.ddns.net", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x2205:$x1: NanoCore.ClientPluginHost
  • 0x223e:$x2: IClientNetworkHost
00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x2205:$x2: NanoCore.ClientPluginHost
  • 0x2320:$s4: PipeCreated
  • 0x221f:$s5: IClientLoggingHost
00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x227f:$x2: NanoCore.ClientPlugin
  • 0x2205:$x3: NanoCore.ClientPluginHost
  • 0x2295:$i3: IClientNetwork
  • 0x221f:$i6: IClientLoggingHost
  • 0x223e:$i7: IClientNetworkHost
  • 0x1f9f:$s1: ClientPlugin
  • 0x2288:$s1: ClientPlugin
00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    Click to see the 70 entries
    SourceRuleDescriptionAuthorStrings
    5.2.QUOTATION.exe.6e90000.33.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x350b:$x1: NanoCore.ClientPluginHost
    • 0x3525:$x2: IClientNetworkHost
    5.2.QUOTATION.exe.6e90000.33.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x350b:$x2: NanoCore.ClientPluginHost
    • 0x52b6:$s4: PipeCreated
    • 0x34f8:$s5: IClientLoggingHost
    5.2.QUOTATION.exe.6e90000.33.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0x34e2:$x2: NanoCore.ClientPlugin
    • 0x350b:$x3: NanoCore.ClientPluginHost
    • 0x34d3:$i3: IClientNetwork
    • 0x34f8:$i6: IClientLoggingHost
    • 0x3525:$i7: IClientNetworkHost
    • 0x334e:$s1: ClientPlugin
    • 0x34eb:$s1: ClientPlugin
    5.2.QUOTATION.exe.6e90000.33.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x170b:$x1: NanoCore.ClientPluginHost
    • 0x1725:$x2: IClientNetworkHost
    5.2.QUOTATION.exe.6e90000.33.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x170b:$x2: NanoCore.ClientPluginHost
    • 0x34b6:$s4: PipeCreated
    • 0x16f8:$s5: IClientLoggingHost
    Click to see the 232 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\QUOTATION.exe, ProcessId: 1052, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\QUOTATION.exe, ProcessId: 1052, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\QUOTATION.exe, ProcessId: 1052, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\QUOTATION.exe, ProcessId: 1052, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:192.168.2.6212.193.30.2044977411872816766 05/11/22-18:34:53.312719
    SID:2816766
    Source Port:49774
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044985611872816766 05/11/22-18:36:21.786696
    SID:2816766
    Source Port:49856
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044983111872816766 05/11/22-18:36:15.708740
    SID:2816766
    Source Port:49831
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:212.193.30.204192.168.2.61187497802810290 05/11/22-18:35:07.758520
    SID:2810290
    Source Port:1187
    Destination Port:49780
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044980511872816766 05/11/22-18:36:01.158778
    SID:2816766
    Source Port:49805
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044980011872816766 05/11/22-18:35:40.802538
    SID:2816766
    Source Port:49800
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044977711872816766 05/11/22-18:35:01.955240
    SID:2816766
    Source Port:49777
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044978711872816766 05/11/22-18:35:14.531508
    SID:2816766
    Source Port:49787
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044979711872816766 05/11/22-18:35:34.087505
    SID:2816766
    Source Port:49797
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044986211872816766 05/11/22-18:36:27.889829
    SID:2816766
    Source Port:49862
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044980911872816766 05/11/22-18:36:07.741009
    SID:2816766
    Source Port:49809
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044979711872816718 05/11/22-18:35:34.087505
    SID:2816718
    Source Port:49797
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044980211872816766 05/11/22-18:35:47.819257
    SID:2816766
    Source Port:49802
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:212.193.30.204192.168.2.61187498622841753 05/11/22-18:36:36.975115
    SID:2841753
    Source Port:1187
    Destination Port:49862
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044978011872816766 05/11/22-18:35:07.459686
    SID:2816766
    Source Port:49780
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044979611872816766 05/11/22-18:35:26.904734
    SID:2816766
    Source Port:49796
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.6212.193.30.2044978811872816766 05/11/22-18:35:20.778412
    SID:2816766
    Source Port:49788
    Destination Port:1187
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "fe56abb4-cb76-44f1-89b4-7bb11730", "Group": "Default", "Domain1": "deranano2.ddns.net", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
    Source: QUOTATION.exeReversingLabs: Detection: 17%
    Source: deranano2.ddns.netAvira URL Cloud: Label: malware
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c64629.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b38a28.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b2458d.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b3d051.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b38a28.13.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c60000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c60000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 636, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 1052, type: MEMORYSTR
    Source: 5.0.QUOTATION.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 5.0.QUOTATION.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 5.2.QUOTATION.exe.5c60000.22.unpackAvira: Label: TR/NanoCore.fadte
    Source: 5.0.QUOTATION.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 5.0.QUOTATION.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 5.0.QUOTATION.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 5.2.QUOTATION.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: QUOTATION.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
    Source: QUOTATION.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: QUOTATION.exe, 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: IClosa.pdb source: QUOTATION.exe
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: QUOTATION.exe, 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp

    Networking

    barindex
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49774 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49777 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49780 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 212.193.30.204:1187 -> 192.168.2.6:49780
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49787 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49788 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49796 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49797 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.6:49797 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49800 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49802 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49805 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49809 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49831 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49856 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49862 -> 212.193.30.204:1187
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 212.193.30.204:1187 -> 192.168.2.6:49862
    Source: Malware configuration extractorURLs:
    Source: Malware configuration extractorURLs: deranano2.ddns.net
    Source: unknownDNS query: name: deranano2.ddns.net
    Source: Joe Sandbox ViewASN Name: SPD-NETTR SPD-NETTR
    Source: Joe Sandbox ViewIP Address: 212.193.30.204 212.193.30.204
    Source: global trafficTCP traffic: 192.168.2.6:49774 -> 212.193.30.204:1187
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: unknownDNS traffic detected: queries for: deranano2.ddns.net
    Source: QUOTATION.exe, 00000001.00000002.415699378.000000000085B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: QUOTATION.exe, 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c64629.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b38a28.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b2458d.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b3d051.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b38a28.13.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c60000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c60000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 636, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 1052, type: MEMORYSTR

    System Summary

    barindex
    Source: 5.2.QUOTATION.exe.6e90000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6e90000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6e90000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6e90000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6bb0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6bb0000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.5c64629.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.5c64629.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6b80000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6b80000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.5ed0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.5ed0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3ade5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3ade5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3ad9930.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3ad9930.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6ee0000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6ee0000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3b38a28.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3b38a28.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3e1d82f.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3e1d82f.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3e1d82f.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.6b80000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6b80000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b2384c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b2384c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b175b4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b175b4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6bb0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6bb0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3b2458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3b2458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3b3d051.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3b3d051.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3ae81d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3ae81d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3d58a06.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3d58a06.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b2384c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b2384c.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6b90000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6b90000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3b38a28.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3b38a28.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.5c60000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.5c60000.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6ea0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6ea0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6eae8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6eae8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.5ed0000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.5ed0000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6d00000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6d00000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b175b4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b175b4.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6d20000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6ea4c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6ea4c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6d20000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3e1d82f.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3e1d82f.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6ee0000.37.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6ee0000.37.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3e34a8e.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3e34a8e.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3e34a8e.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3e34a8e.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.5c60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.5c60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6d00000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6d00000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.2b78f78.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b78f78.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b78f78.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.6b90000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6b90000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6b70000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6b70000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6ba0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6ba0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3d58a06.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3d58a06.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3d58a06.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.6ea0000.36.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6ea0000.36.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.5bc0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.5bc0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.6d20000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.6d20000.32.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3ad9930.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3ad9930.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.3e2665e.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3e2665e.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3d66e36.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3d66e36.16.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
    Source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.3e2665e.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3e2665e.19.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3d66e36.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.3d66e36.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.3d66e36.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.QUOTATION.exe.2518984.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b081f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 5.2.QUOTATION.exe.2b081f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 5.2.QUOTATION.exe.2b081f8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.QUOTATION.exe.252be1c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
    Source: 1.2.QUOTATION.exe.251fbd0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
    Source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
    Source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: QUOTATION.exe PID: 636, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: QUOTATION.exe PID: 636, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: QUOTATION.exe PID: 1052, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: QUOTATION.exe PID: 1052, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: initial sampleStatic PE information: Filename: QUOTATION.exe
    Source: QUOTATION.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
    Source: 5.2.QUOTATION.exe.6e90000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6e90000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6e90000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6e90000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6e90000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6e90000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6bb0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6bb0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6bb0000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.5c64629.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.5c64629.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.5c64629.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6b80000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6b80000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6b80000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.5ed0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.5ed0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.5ed0000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3ade5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3ade5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3ade5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3ad9930.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3ad9930.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3ad9930.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6ee0000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6ee0000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6ee0000.37.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3b38a28.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3b38a28.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3b38a28.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3e1d82f.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3e1d82f.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3e1d82f.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3e1d82f.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.6b80000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6b80000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6b80000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b2384c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b2384c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.2b2384c.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b175b4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b175b4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.2b175b4.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6bb0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6bb0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6bb0000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3b2458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3b2458d.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3b2458d.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3b3d051.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3b3d051.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3b3d051.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3ae81d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3ae81d4.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3ae81d4.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3d58a06.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3d58a06.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3d58a06.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b2384c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b2384c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.2b2384c.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6b90000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6b90000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6b90000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3b38a28.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3b38a28.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3b38a28.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.5c60000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.5c60000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.5c60000.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6ea0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6ea0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6ea0000.36.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6eae8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6eae8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6eae8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.5ed0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.5ed0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.5ed0000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6d00000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6d00000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6d00000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b175b4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b175b4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.2b175b4.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6d20000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6d20000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6ea4c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6ea4c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6ea4c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6d20000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3e1d82f.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3e1d82f.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3e1d82f.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6ee0000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6ee0000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6ee0000.37.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3e34a8e.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3e34a8e.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3e34a8e.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3e34a8e.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3e34a8e.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3e34a8e.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.5c60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.5c60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.5c60000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6d00000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6d00000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6d00000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.2b78f78.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b78f78.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b78f78.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.6b90000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6b90000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6b90000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6b70000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6b70000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6b70000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6ba0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6ba0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6ba0000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3d58a06.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3d58a06.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3d58a06.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3d58a06.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.6ea0000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6ea0000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6ea0000.36.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.5bc0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.5bc0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.5bc0000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.6d20000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.6d20000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.6d20000.32.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3ad9930.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3ad9930.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3ad9930.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b7e9b0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3d4fbd7.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.3e2665e.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3e2665e.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3e2665e.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3d66e36.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3d66e36.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3d66e36.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
    Source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.3e2665e.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3e2665e.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3e2665e.19.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3d66e36.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.3d66e36.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.3d66e36.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.3d66e36.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b8a1ec.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.QUOTATION.exe.2518984.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
    Source: 5.2.QUOTATION.exe.2b081f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 5.2.QUOTATION.exe.2b081f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 5.2.QUOTATION.exe.2b081f8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 5.2.QUOTATION.exe.2b081f8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.QUOTATION.exe.252be1c.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
    Source: 1.2.QUOTATION.exe.251fbd0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
    Source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
    Source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: QUOTATION.exe PID: 636, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: QUOTATION.exe PID: 636, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: QUOTATION.exe PID: 1052, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: QUOTATION.exe PID: 1052, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00B1CC9C1_2_00B1CC9C
    Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00B1EED81_2_00B1EED8
    Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00B1EEC81_2_00B1EEC8
    Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 5_2_05ED02B05_2_05ED02B0
    Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 5_2_0292E4805_2_0292E480
    Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 5_2_0292E4715_2_0292E471
    Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 5_2_0292BBD45_2_0292BBD4
    Source: QUOTATION.exe, 00000001.00000000.365542409.00000000001AA000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameIClosa.exe. vs QUOTATION.exe
    Source: QUOTATION.exe, 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs QUOTATION.exe
    Source: QUOTATION.exe, 00000001.00000002.422737136.0000000006D40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs QUOTATION.exe
    Source: QUOTATION.exe, 00000001.00000002.421779048.0000000006980000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFort.dll" vs QUOTATION.exe
    Source: QUOTATION.exeBinary or memory string: OriginalFilename vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000000.411504531.00000000006FA000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameIClosa.exe. vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.637915665.0000000003AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.637915665.0000000003AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.637915665.0000000003AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000003.425610931.0000000000BDF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641129187.0000000005EC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs QUOTATION.exe
    Source: QUOTATION.exe, 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs QUOTATION.exe
    Source: QUOTATION.exeBinary or memory string: OriginalFilenameIClosa.exe. vs QUOTATION.exe
    Source: QUOTATION.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: QUOTATION.exeReversingLabs: Detection: 17%
    Source: C:\Users\user\Desktop\QUOTATION.exeFile read: C:\Users\user\Desktop\QUOTATION.exeJump to behavior
    Source: QUOTATION.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\QUOTATION.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION.exe "C:\Users\user\Desktop\QUOTATION.exe"
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Users\user\Desktop\QUOTATION.exe C:\Users\user\Desktop\QUOTATION.exe
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Users\user\Desktop\QUOTATION.exe C:\Users\user\Desktop\QUOTATION.exeJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QUOTATION.exe.logJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/5@14/2
    Source: 5.0.QUOTATION.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 5.0.QUOTATION.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 5.0.QUOTATION.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 5.0.QUOTATION.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 5.0.QUOTATION.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 5.0.QUOTATION.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 5.0.QUOTATION.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 5.0.QUOTATION.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: C:\Users\user\Desktop\QUOTATION.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{fe56abb4-cb76-44f1-89b4-7bb11730ab9d}
    Source: 5.0.QUOTATION.exe.400000.6.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 5.0.QUOTATION.exe.400000.6.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 5.0.QUOTATION.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 5.0.QUOTATION.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 5.0.QUOTATION.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 5.0.QUOTATION.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 5.0.QUOTATION.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 5.0.QUOTATION.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 5.0.QUOTATION.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: C:\Users\user\Desktop\QUOTATION.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: QUOTATION.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: QUOTATION.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: QUOTATION.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: QUOTATION.exe, 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: IClosa.pdb source: QUOTATION.exe
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: QUOTATION.exe, 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: QUOTATION.exe, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 1.2.QUOTATION.exe.100000.0.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 1.0.QUOTATION.exe.100000.0.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.400000.6.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.2.QUOTATION.exe.650000.1.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.650000.1.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.650000.0.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.650000.2.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.650000.9.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.650000.7.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.400000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.650000.11.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.650000.5.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 5.0.QUOTATION.exe.650000.13.unpack, DZ/hD.cs.Net Code: FOC System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00B1C0C0 pushad ; iretd 1_2_00B1C0C1
    Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00B1C128 pushfd ; iretd 1_2_00B1C129
    Source: initial sampleStatic PE information: section name: .text entropy: 7.85363185265
    Source: 5.0.QUOTATION.exe.400000.6.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 5.0.QUOTATION.exe.400000.6.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 5.0.QUOTATION.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 5.0.QUOTATION.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 5.0.QUOTATION.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 5.0.QUOTATION.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 5.0.QUOTATION.exe.400000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 5.0.QUOTATION.exe.400000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\QUOTATION.exeFile opened: C:\Users\user\Desktop\QUOTATION.exe:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: 1.2.QUOTATION.exe.2518984.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.252be1c.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.251fbd0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000001.00000002.416586877.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 636, type: MEMORYSTR
    Source: QUOTATION.exe, 00000001.00000002.416586877.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
    Source: QUOTATION.exe, 00000001.00000002.416586877.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
    Source: C:\Users\user\Desktop\QUOTATION.exe TID: 2324Thread sleep time: -45733s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exe TID: 5636Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exe TID: 6076Thread sleep time: -13835058055282155s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeWindow / User API: threadDelayed 5456Jump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeWindow / User API: threadDelayed 3752Jump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeWindow / User API: foregroundWindowGot 678Jump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeWindow / User API: foregroundWindowGot 762Jump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeThread delayed: delay time: 45733Jump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: QUOTATION.exe, 00000001.00000002.416586877.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: QUOTATION.exe, 00000001.00000002.416586877.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
    Source: QUOTATION.exeBinary or memory string: a]hVMci
    Source: QUOTATION.exe, 00000001.00000002.416586877.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
    Source: QUOTATION.exe, 00000005.00000003.426319113.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000003.425628506.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.631865092.0000000000BEE000.00000004.00000020.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000003.426931998.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000003.428720756.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000003.428601627.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000003.429385256.0000000000BF3000.00000004.00000020.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000003.500464778.0000000000BEE000.00000004.00000020.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000003.426588395.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000003.429488260.0000000000BF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: QUOTATION.exe, 00000001.00000002.416586877.00000000024C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Users\user\Desktop\QUOTATION.exe C:\Users\user\Desktop\QUOTATION.exeJump to behavior
    Source: QUOTATION.exe, 00000005.00000002.635237708.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.637467627.0000000002F88000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.635280236.0000000002C3C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager#xp
    Source: QUOTATION.exe, 00000005.00000002.641766867.0000000006E8C000.00000004.00000010.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641664223.0000000006CFA000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
    Source: QUOTATION.exe, 00000005.00000002.642071541.000000000770C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerl
    Source: QUOTATION.exe, 00000005.00000002.641052824.0000000005DBC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager 8
    Source: QUOTATION.exe, 00000005.00000002.637521725.0000000002FB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4
    Source: QUOTATION.exe, 00000005.00000002.642047911.00000000075CC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: QUOTATION.exe, 00000005.00000002.642169555.0000000007B0B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager h
    Source: QUOTATION.exe, 00000005.00000002.635280236.0000000002C3C000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.637809442.00000000030B4000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.637521725.0000000002FB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerxp
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Users\user\Desktop\QUOTATION.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Users\user\Desktop\QUOTATION.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\QUOTATION.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c64629.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b38a28.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b2458d.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b3d051.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b38a28.13.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c60000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c60000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 636, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 1052, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: QUOTATION.exe, 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exeString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: QUOTATION.exe, 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: QUOTATION.exe, 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.637915665.0000000003AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: QUOTATION.exe, 00000005.00000003.425610931.0000000000BDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: QUOTATION.exe, 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: QUOTATION.exe, 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: QUOTATION.exe, 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: QUOTATION.exe, 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: QUOTATION.exe, 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: QUOTATION.exe, 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: QUOTATION.exe, 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c64629.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b38a28.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b2458d.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b3d051.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.3b38a28.13.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c60000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.5c60000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.36095b8.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.0.QUOTATION.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.36095b8.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.QUOTATION.exe.35cbd98.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 636, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 1052, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    Path Interception12
    Process Injection
    1
    Masquerading
    21
    Input Capture
    1
    Query Registry
    Remote Services21
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Disable or Modify Tools
    LSASS Memory111
    Security Software Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
    Process Injection
    NTDS21
    Virtualization/Sandbox Evasion
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingData Transfer Size Limits21
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain Credentials12
    System Information Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items2
    Obfuscated Files or Information
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    QUOTATION.exe17%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
    No Antivirus matches
    SourceDetectionScannerLabelLinkDownload
    5.0.QUOTATION.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    5.0.QUOTATION.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    5.2.QUOTATION.exe.5c60000.22.unpack100%AviraTR/NanoCore.fadteDownload File
    5.0.QUOTATION.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    5.0.QUOTATION.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    5.0.QUOTATION.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    5.2.QUOTATION.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    No Antivirus matches
    SourceDetectionScannerLabelLink
    0%Avira URL Cloudsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    deranano2.ddns.net100%Avira URL Cloudmalware
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    deranano2.ddns.net
    212.193.30.204
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      true
      • Avira URL Cloud: safe
      low
      deranano2.ddns.nettrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.apache.org/licenses/LICENSE-2.0QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.comQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.com/designersGQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.com/designers/?QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.founder.com.cn/cn/bTheQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.tiro.comQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.goodfont.co.krQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://google.comQUOTATION.exe, 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION.exe, 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.carterandcone.comlQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/cTheQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-jones.htmlQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8QUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fonts.comQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sandoll.co.krQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleaseQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cnQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.comQUOTATION.exe, 00000001.00000002.421125700.0000000006522000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            212.193.30.204
                            deranano2.ddns.netRussian Federation
                            57844SPD-NETTRtrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:34.0.0 Boulder Opal
                            Analysis ID:624514
                            Start date and time: 11/05/202218:33:142022-05-11 18:33:14 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 10m 38s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Sample file name:QUOTATION.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:21
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@3/5@14/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 1.9% (good quality ratio 1.7%)
                            • Quality average: 68.5%
                            • Quality standard deviation: 29.8%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 38
                            • Number of non-executed functions: 3
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Adjust boot time
                            • Enable AMSI
                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                            • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • VT rate limit hit for: QUOTATION.exe
                            TimeTypeDescription
                            18:34:41API Interceptor807x Sleep call for process: QUOTATION.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            212.193.30.2042020574185.exeGet hashmaliciousBrowse
                              ORDER.exeGet hashmaliciousBrowse
                                POP.exeGet hashmaliciousBrowse
                                  Bill Of Lading.exeGet hashmaliciousBrowse
                                    900010225 CON.LUMES JAIPUR 05.02.2022.exeGet hashmaliciousBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      deranano2.ddns.net2020574185.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      ORDER.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      POP.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      Bill Of Lading.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      900010225 CON.LUMES JAIPUR 05.02.2022.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      FYI.exeGet hashmaliciousBrowse
                                      • 194.31.98.18
                                      FYI.exeGet hashmaliciousBrowse
                                      • 194.31.98.18
                                      VOLGOIL LLC SOFT CORPORATE OFFER VESSEL TO TANK.exeGet hashmaliciousBrowse
                                      • 194.31.98.18
                                      product specification and detailspdf.exeGet hashmaliciousBrowse
                                      • 194.31.98.18
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      SPD-NETTRResetter.exeGet hashmaliciousBrowse
                                      • 212.193.30.29
                                      SecuriteInfo.com.Trojan.PackedNET.331.26146.exeGet hashmaliciousBrowse
                                      • 212.193.30.38
                                      hdk8Z67C7x.exeGet hashmaliciousBrowse
                                      • 212.193.30.29
                                      CHANGE OF ACCOUNT RUSH TO DESK.exeGet hashmaliciousBrowse
                                      • 212.193.30.101
                                      2020574185.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      ORDER.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      ckc238HATk.exeGet hashmaliciousBrowse
                                      • 212.193.30.45
                                      ckc238HATk.exeGet hashmaliciousBrowse
                                      • 212.193.30.45
                                      TjDCLiM89x.exeGet hashmaliciousBrowse
                                      • 212.193.30.45
                                      POP.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      AFAC7896CF21983233C533EEAEC870610856969D98218.exeGet hashmaliciousBrowse
                                      • 212.193.30.29
                                      E4FB57012D7A31E6511C4BAC952323093E8BB51F13884.exeGet hashmaliciousBrowse
                                      • 212.193.30.29
                                      E2E7294A6FEE9EF6372897F3BEBFFB0D17BC31B9CF8C6.exeGet hashmaliciousBrowse
                                      • 212.193.30.29
                                      Bill Of Lading.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      900010225 CON.LUMES JAIPUR 05.02.2022.exeGet hashmaliciousBrowse
                                      • 212.193.30.204
                                      7nSmJgc4Js.exeGet hashmaliciousBrowse
                                      • 212.193.30.45
                                      arm7-20220427-0150Get hashmaliciousBrowse
                                      • 185.118.141.120
                                      Setup.exeGet hashmaliciousBrowse
                                      • 212.193.30.29
                                      OrderGY2103881.rtfGet hashmaliciousBrowse
                                      • 212.193.30.19
                                      packingListBLandshippingdocspdf.exeGet hashmaliciousBrowse
                                      • 212.193.30.144
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\QUOTATION.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1750
                                      Entropy (8bit):5.3375092442007315
                                      Encrypted:false
                                      SSDEEP:48:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzvFHYHKlEHUzvAHj:Pq5qXEwCYqhQnoPtIxHeqzN4qm0z4D
                                      MD5:92FEE17DD9A6925BA2D1E5EF2CD6E5F2
                                      SHA1:4614AE0DD188A0FE1983C5A8D82A69AF5BD13039
                                      SHA-256:67351D6FA9F9E11FD21E72581AFDC8E63A284A6080D99A6390641FC11C667235
                                      SHA-512:C599C633D288B845A7FAA31FC0FA86EAB8585CC2C515D68CA0DFC6AB16B27515A5D729EF535109B2CDE29FF3CF4CF725F4F920858501A2421FC7D76C804F2AA7
                                      Malicious:true
                                      Reputation:moderate, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Users\user\Desktop\QUOTATION.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):232
                                      Entropy (8bit):7.024371743172393
                                      Encrypted:false
                                      SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                      MD5:32D0AAE13696FF7F8AF33B2D22451028
                                      SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                      SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                      SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                      Process:C:\Users\user\Desktop\QUOTATION.exe
                                      File Type:Non-ISO extended-ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):8
                                      Entropy (8bit):3.0
                                      Encrypted:false
                                      SSDEEP:3:zWl:0
                                      MD5:91522D41025242D19D64C4FA2D4C2EFD
                                      SHA1:ED596E1834BC20F99EABC9D702E15250E588EFFE
                                      SHA-256:8E9E0CBF71438BABDEE035125FA4B28E1FFCC9DB35550FBFE2296724F54505B5
                                      SHA-512:D390C4FB3BD6C310B5864E50B8B39295D918120A1077E3508E00AB5D52847ECC8ED126BEFA69E41B7BF1F3D9B4CE4B28B0CF585C830A67925EBAE55D60850DA1
                                      Malicious:true
                                      Reputation:low
                                      Preview:#...3.H
                                      Process:C:\Users\user\Desktop\QUOTATION.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):40
                                      Entropy (8bit):5.153055907333276
                                      Encrypted:false
                                      SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                      MD5:4E5E92E2369688041CC82EF9650EDED2
                                      SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                      SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                      SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                                      Process:C:\Users\user\Desktop\QUOTATION.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):327432
                                      Entropy (8bit):7.99938831605763
                                      Encrypted:true
                                      SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                      MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                      SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                      SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                      SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.85137144717535
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Windows Screen Saver (13104/52) 0.07%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:QUOTATION.exe
                                      File size:707584
                                      MD5:dbffb4682e330d635295ccdd92fe99c4
                                      SHA1:ba03bbac64d96bfbd3067803a8b08466b8fb0d3a
                                      SHA256:011c5f305852ea8ef82a26bae0d7b6f59fd70f431b91edb25df06863e0001bc0
                                      SHA512:01fe41d7c24f92d05308b9316ba49adf2e7d2cc410a63e4da7e95dde82a6669f5e39c45ba0306f0c4a9f45174aeabd130fc215e877cc736220b05b9d9594802f
                                      SSDEEP:12288:QF/3DpQp9V5XXkkXIqvCQOeZ/xWzWsCXQhpKn+nj4/sHtNdC8Sgp:QF/3DG/YkvvWeZ/xWzWsQQhsnCOcdv
                                      TLSH:87E4011CBAF7DA22D16E2B3990F280945771BE89A033D31E35DC134E9F16B9349467A3
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....f{b..............0..p...Z........... ........@.. ....................... ............@................................
                                      Icon Hash:f0f2f25944bcce78
                                      Entrypoint:0x4a8f0e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x627B66A8 [Wed May 11 07:32:56 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:v4.0.30319
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xa8ec00x4b.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x57ac.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xa8e810x1c.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xa6f140xa7000False0.886948271426data7.85363185265IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rsrc0xaa0000x57ac0x5800False0.964799360795data7.88885953367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xb00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0xaa1300x5164PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                      RT_GROUP_ICON0xaf2940x14data
                                      RT_VERSION0xaf2a80x318data
                                      RT_MANIFEST0xaf5c00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      DescriptionData
                                      Translation0x0000 0x04b0
                                      LegalCopyrightKids Mart 2012
                                      Assembly Version1.0.0.0
                                      InternalNameIClosa.exe
                                      FileVersion1.0.0.0
                                      CompanyNameKids Mart
                                      LegalTrademarks
                                      Comments
                                      ProductNameVoroni
                                      ProductVersion1.0.0.0
                                      FileDescriptionVoroni
                                      OriginalFilenameIClosa.exe
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.6212.193.30.2044977411872816766 05/11/22-18:34:53.312719TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497741187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044985611872816766 05/11/22-18:36:21.786696TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498561187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044983111872816766 05/11/22-18:36:15.708740TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498311187192.168.2.6212.193.30.204
                                      212.193.30.204192.168.2.61187497802810290 05/11/22-18:35:07.758520TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1118749780212.193.30.204192.168.2.6
                                      192.168.2.6212.193.30.2044980511872816766 05/11/22-18:36:01.158778TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498051187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044980011872816766 05/11/22-18:35:40.802538TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498001187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044977711872816766 05/11/22-18:35:01.955240TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497771187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044978711872816766 05/11/22-18:35:14.531508TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497871187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044979711872816766 05/11/22-18:35:34.087505TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497971187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044986211872816766 05/11/22-18:36:27.889829TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498621187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044980911872816766 05/11/22-18:36:07.741009TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498091187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044979711872816718 05/11/22-18:35:34.087505TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497971187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044980211872816766 05/11/22-18:35:47.819257TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498021187192.168.2.6212.193.30.204
                                      212.193.30.204192.168.2.61187498622841753 05/11/22-18:36:36.975115TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)118749862212.193.30.204192.168.2.6
                                      192.168.2.6212.193.30.2044978011872816766 05/11/22-18:35:07.459686TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497801187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044979611872816766 05/11/22-18:35:26.904734TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497961187192.168.2.6212.193.30.204
                                      192.168.2.6212.193.30.2044978811872816766 05/11/22-18:35:20.778412TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497881187192.168.2.6212.193.30.204
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 11, 2022 18:34:52.318828106 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.347148895 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.350502968 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.406663895 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.470082998 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.483499050 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.511833906 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.665107012 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.716006041 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.808214903 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.858473063 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.858520031 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.858551025 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.858582020 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.858633995 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.858671904 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.885740995 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.885777950 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.885803938 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.885823965 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.885843992 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.885871887 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.885896921 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.885922909 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.885981083 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.886040926 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.886049032 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.913367987 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913407087 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913433075 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913459063 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913484097 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913510084 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913536072 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913561106 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913587093 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913588047 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.913613081 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913640976 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913665056 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913690090 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913707018 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.913714886 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.913716078 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913744926 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913770914 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.913856983 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.913867950 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941195011 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941226006 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941251993 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941277981 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941304922 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941334963 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941359997 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941382885 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941386938 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941397905 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941400051 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941417933 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941445112 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941461086 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941472054 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941499949 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941528082 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941555977 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941580057 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941605091 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941611052 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941616058 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941617966 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941632986 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941658974 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941682100 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941735029 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941761017 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941777945 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941781044 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941782951 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941787958 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941827059 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941852093 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941875935 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941900969 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941919088 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941942930 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941952944 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941956997 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941958904 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.941967964 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.941992044 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.942243099 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.942270041 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.972409010 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972522020 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972564936 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972605944 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972644091 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972682953 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972723007 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972752094 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.972765923 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972784996 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.972793102 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.972809076 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972841024 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.972850084 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972891092 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972930908 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.972969055 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973007917 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973047018 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973061085 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973072052 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973077059 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973088026 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973129988 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973167896 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973206997 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973246098 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973283052 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973298073 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973308086 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973314047 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973323107 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973366976 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973412037 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973453999 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973490953 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973493099 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973500013 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973532915 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973572969 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973611116 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973649025 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973687887 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973704100 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973714113 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973721981 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973731041 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973773003 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973810911 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973850965 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973890066 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973927021 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.973942041 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973949909 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973954916 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.973967075 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974006891 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974047899 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974087954 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974126101 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974165916 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974179029 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.974189043 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.974195004 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.974205971 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974244118 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974282980 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974322081 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974350929 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.974359989 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:52.974380970 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:52.974642992 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.002288103 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002340078 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002383947 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002420902 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.002424955 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002466917 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002507925 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002547026 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002587080 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002618074 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.002626896 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.002629995 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002667904 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.002672911 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002713919 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002753973 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002793074 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002830029 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002867937 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002897024 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.002904892 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.002909899 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.002909899 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002953053 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.002994061 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003031015 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003070116 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003108978 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003137112 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003148079 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003184080 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003189087 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003190994 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003232956 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003272057 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003300905 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003313065 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003319025 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003355980 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003395081 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003434896 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003473043 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003510952 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003535032 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003546000 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003549099 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003555059 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003596067 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003621101 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003638983 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003676891 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003730059 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003752947 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003794909 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003832102 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003859043 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.003874063 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003914118 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003951073 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.003988981 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.004026890 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.004059076 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.004066944 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.004067898 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.004072905 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.004111052 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.004149914 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.004190922 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.004230022 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.004301071 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.004339933 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.004344940 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.031342983 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031450033 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031497002 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031537056 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031577110 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031614065 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.031619072 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031636000 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.031658888 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031698942 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031738043 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031776905 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031831980 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031841993 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.031848907 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.031852961 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.031872988 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031912088 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031950951 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.031970978 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.031991005 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032012939 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.032032013 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032074928 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032114983 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032154083 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032192945 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032231092 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032243967 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.032250881 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.032254934 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.032270908 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032311916 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032355070 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032397032 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032433987 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.032489061 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.032495022 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.032499075 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.033399105 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033443928 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033483028 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033523083 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033561945 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033598900 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.033602953 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033632040 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.033646107 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033646107 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.033687115 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033726931 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033763885 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.033766985 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033806086 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033844948 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033883095 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.033885002 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033895969 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.033926010 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.033967972 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034007072 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034045935 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034065962 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034075022 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034086943 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034126997 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034142017 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034166098 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034204960 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034235954 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034264088 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034303904 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034327984 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034348965 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034388065 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034426928 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034466982 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034523010 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034526110 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034532070 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034537077 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034563065 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034600973 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034641981 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034682989 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034719944 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034759998 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034770966 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034778118 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034782887 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034800053 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034837961 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034878016 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034918070 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034956932 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.034970999 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034976959 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.034997940 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.035037041 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.035074949 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.035114050 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.035151005 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.035170078 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.035178900 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.035182953 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.035191059 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.035231113 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.035270929 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.035311937 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.035370111 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.035377026 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.064729929 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.064780951 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.064820051 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.064862013 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.064903021 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.064943075 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.064965010 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.064982891 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.064985991 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.064990044 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065025091 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065066099 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065108061 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065148115 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065190077 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065200090 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065205097 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065208912 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065232038 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065269947 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065309048 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065350056 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065391064 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065431118 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065438986 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065445900 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065449953 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065469980 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065510988 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065550089 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065587044 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065624952 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065664053 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065670967 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065676928 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065680027 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065706015 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065871954 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065913916 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065953016 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.065972090 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065979004 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.065992117 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066023111 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066061020 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066088915 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.066101074 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066140890 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066267014 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.066273928 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066282034 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.066314936 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066358089 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066400051 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066405058 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.066437960 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066477060 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:53.066749096 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.066761017 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.312719107 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:53.396348953 CEST118749774212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:54.612854004 CEST497741187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:59.116914034 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:59.145973921 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:59.146153927 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:59.168004036 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:59.219691038 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:59.220132113 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:59.248673916 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:59.478050947 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:59.706001997 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:34:59.788136959 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:34:59.987417936 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:00.165898085 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:00.193500042 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:00.275039911 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:00.566806078 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:00.661928892 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:00.734889030 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:00.818140984 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:00.818239927 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:00.845796108 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:00.978126049 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:00.992666006 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:01.006470919 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:01.068778992 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:01.084474087 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:01.162576914 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:01.955240011 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:02.040900946 CEST118749777212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:02.409889936 CEST497771187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:06.613888025 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:06.641458988 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:06.641680002 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:06.662918091 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:06.717088938 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:06.732592106 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:06.765633106 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:06.806757927 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:07.064057112 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:07.148039103 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:07.294928074 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:07.303113937 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:07.330980062 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:07.332158089 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:07.359479904 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:07.359657049 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:07.387305021 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:07.387481928 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:07.458798885 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:07.459686041 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:07.537810087 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:07.758519888 CEST118749780212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:07.806967974 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:08.531812906 CEST497801187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:12.702718019 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:12.731461048 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:12.731584072 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:12.732144117 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:12.790414095 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:12.790841103 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:12.818998098 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:12.869935989 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:13.440486908 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:13.521569967 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:13.581371069 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:13.662638903 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:13.666134119 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:13.667262077 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:13.695419073 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:13.717681885 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:13.745349884 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:13.745573044 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:13.773474932 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:13.857007027 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:13.927675962 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:14.531507969 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:14.615192890 CEST118749787212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:15.598047972 CEST497871187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:19.754311085 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:19.784137964 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:19.784286976 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:19.785026073 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:19.839943886 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:19.840291023 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:19.868587971 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:19.979793072 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:20.198447943 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:20.287462950 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:20.436196089 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:20.440891027 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:20.469266891 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:20.573623896 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:20.591403961 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:20.619919062 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:20.620090008 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:20.648072958 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:20.648209095 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:20.740024090 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:20.778412104 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:20.865030050 CEST118749788212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:21.811824083 CEST497881187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:25.881808043 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:25.909548998 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:25.909790993 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:25.910413027 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:25.984268904 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:25.984652996 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:26.013712883 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:26.199053049 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:26.207953930 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:26.289089918 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:26.450934887 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:26.479362965 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:26.506863117 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:26.528264999 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:26.558067083 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:26.558155060 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:26.587820053 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:26.674671888 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:26.756073952 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:26.904733896 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:26.990284920 CEST118749796212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:28.013355017 CEST497961187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:32.334022045 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:32.361392975 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:32.361572027 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:32.362296104 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:32.408912897 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:32.434271097 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:32.463666916 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:32.512111902 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:32.729870081 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:32.818126917 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:32.971138000 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:32.973344088 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:33.000819921 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:33.002198935 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:33.032177925 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:33.032371044 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:33.061108112 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:33.061242104 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:33.147842884 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:33.148039103 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:33.240230083 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:34.087505102 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:34.178932905 CEST118749797212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:35.118855953 CEST497971187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.202826977 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.229983091 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:39.230205059 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.230822086 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.282938957 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:39.283291101 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.311261892 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:39.418994904 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.503129005 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.583837032 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:39.770711899 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:39.830240965 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.857321978 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:39.857505083 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.943383932 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:39.943483114 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:39.970733881 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:40.028418064 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:40.055511951 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:40.237708092 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:40.264756918 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:40.419068098 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:40.541304111 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:40.632296085 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:40.802537918 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:40.880853891 CEST118749800212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:41.787714958 CEST498001187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:46.749486923 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:46.776571035 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:46.776705027 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:46.793487072 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:46.838126898 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:46.843944073 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:46.928719044 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:46.928836107 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:46.956785917 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:47.015757084 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:47.363549948 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:47.444308043 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:47.608374119 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:47.612806082 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:47.639962912 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:47.649182081 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:47.681399107 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:47.681822062 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:47.709088087 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:47.735922098 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:47.818072081 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:47.819257021 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:47.912220001 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:48.365670919 CEST118749802212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:48.561168909 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:48.802583933 CEST498021187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:59.400696993 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:59.429940939 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:59.430236101 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:59.449424982 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:59.496915102 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:59.510375977 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:59.537942886 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:35:59.655728102 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:59.849797010 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:35:59.943290949 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:00.081893921 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:00.117209911 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:00.118230104 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:00.145723104 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:00.146924973 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:00.175451994 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:00.178687096 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:00.210057974 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:00.237211943 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:00.318397045 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:01.158777952 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:01.255883932 CEST118749805212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:02.228724003 CEST498051187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:06.861155987 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:06.888530970 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:06.893029928 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:06.927460909 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:06.982242107 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:07.013257980 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:07.041105986 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:07.159815073 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:07.254720926 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:07.333745003 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:07.552352905 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:07.556086063 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:07.587785959 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:07.589868069 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:07.618458033 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:07.619302988 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:07.647322893 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:07.652465105 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:07.740920067 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:07.741008997 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:07.818234921 CEST118749809212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:08.707731962 CEST498091187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:13.291997910 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:13.320324898 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:13.320492029 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:13.405330896 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:13.455646038 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:13.490962982 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:13.519928932 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:13.660382986 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:14.695806026 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:14.776144028 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:14.899765968 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:14.994669914 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:15.137315989 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:15.157198906 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:15.186881065 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:15.217269897 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:15.244914055 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:15.245016098 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:15.272883892 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:15.457429886 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:15.708739996 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:15.788067102 CEST118749831212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:16.758019924 CEST498311187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:20.827016115 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:20.854928970 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:20.855035067 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:20.855640888 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:20.943466902 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:20.948429108 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:20.961394072 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:20.989165068 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:21.036021948 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:21.686296940 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:21.772347927 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:21.786695957 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:21.865462065 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:21.954392910 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:21.976938963 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:22.005465031 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:22.006618977 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:22.034431934 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:22.034506083 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:22.065134048 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:22.114190102 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:22.445096970 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:22.522725105 CEST118749856212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:22.818020105 CEST498561187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:26.894062996 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:26.921184063 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:26.921649933 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:26.922666073 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:26.975282907 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:26.975800037 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:27.005143881 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:27.052164078 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:27.371881008 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:27.459110975 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:27.632469893 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:27.660146952 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:27.693468094 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:27.697329998 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:27.730413914 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:27.730556011 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:27.760271072 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:27.802133083 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:27.889828920 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:27.976249933 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:27.977087021 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:28.054768085 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:28.873137951 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:28.927246094 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:31.963120937 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:32.036915064 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:36.975115061 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:37.131532907 CEST498621187192.168.2.6212.193.30.204
                                      May 11, 2022 18:36:37.159081936 CEST118749862212.193.30.204192.168.2.6
                                      May 11, 2022 18:36:37.240454912 CEST498621187192.168.2.6212.193.30.204
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 11, 2022 18:34:52.287666082 CEST5174853192.168.2.68.8.8.8
                                      May 11, 2022 18:34:52.306927919 CEST53517488.8.8.8192.168.2.6
                                      May 11, 2022 18:34:59.093965054 CEST5095853192.168.2.68.8.8.8
                                      May 11, 2022 18:34:59.111686945 CEST53509588.8.8.8192.168.2.6
                                      May 11, 2022 18:35:06.523456097 CEST5655053192.168.2.68.8.8.8
                                      May 11, 2022 18:35:06.545044899 CEST53565508.8.8.8192.168.2.6
                                      May 11, 2022 18:35:12.681927919 CEST5703753192.168.2.68.8.8.8
                                      May 11, 2022 18:35:12.701590061 CEST53570378.8.8.8192.168.2.6
                                      May 11, 2022 18:35:19.731717110 CEST6060953192.168.2.68.8.8.8
                                      May 11, 2022 18:35:19.753113031 CEST53606098.8.8.8192.168.2.6
                                      May 11, 2022 18:35:25.857225895 CEST5208953192.168.2.68.8.8.8
                                      May 11, 2022 18:35:25.877197981 CEST53520898.8.8.8192.168.2.6
                                      May 11, 2022 18:35:32.226279974 CEST5448953192.168.2.68.8.8.8
                                      May 11, 2022 18:35:32.245639086 CEST53544898.8.8.8192.168.2.6
                                      May 11, 2022 18:35:39.179836988 CEST5382953192.168.2.68.8.8.8
                                      May 11, 2022 18:35:39.201423883 CEST53538298.8.8.8192.168.2.6
                                      May 11, 2022 18:35:46.664163113 CEST5868953192.168.2.68.8.8.8
                                      May 11, 2022 18:35:46.681548119 CEST53586898.8.8.8192.168.2.6
                                      May 11, 2022 18:35:58.912822962 CEST4952053192.168.2.68.8.8.8
                                      May 11, 2022 18:35:58.932028055 CEST53495208.8.8.8192.168.2.6
                                      May 11, 2022 18:36:06.740097046 CEST5296553192.168.2.68.8.8.8
                                      May 11, 2022 18:36:06.761792898 CEST53529658.8.8.8192.168.2.6
                                      May 11, 2022 18:36:12.778187037 CEST6023853192.168.2.68.8.8.8
                                      May 11, 2022 18:36:12.797620058 CEST53602388.8.8.8192.168.2.6
                                      May 11, 2022 18:36:20.803953886 CEST5222553192.168.2.68.8.8.8
                                      May 11, 2022 18:36:20.825550079 CEST53522258.8.8.8192.168.2.6
                                      May 11, 2022 18:36:26.871653080 CEST5766953192.168.2.68.8.8.8
                                      May 11, 2022 18:36:26.889264107 CEST53576698.8.8.8192.168.2.6
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      May 11, 2022 18:34:52.287666082 CEST192.168.2.68.8.8.80x6979Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:34:59.093965054 CEST192.168.2.68.8.8.80x581bStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:35:06.523456097 CEST192.168.2.68.8.8.80xfcc6Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:35:12.681927919 CEST192.168.2.68.8.8.80xf6fcStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:35:19.731717110 CEST192.168.2.68.8.8.80xbffStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:35:25.857225895 CEST192.168.2.68.8.8.80x263Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:35:32.226279974 CEST192.168.2.68.8.8.80x42baStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:35:39.179836988 CEST192.168.2.68.8.8.80xcda1Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:35:46.664163113 CEST192.168.2.68.8.8.80x9beaStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:35:58.912822962 CEST192.168.2.68.8.8.80xd6ecStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:36:06.740097046 CEST192.168.2.68.8.8.80x46f8Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:36:12.778187037 CEST192.168.2.68.8.8.80xb4b2Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:36:20.803953886 CEST192.168.2.68.8.8.80xa1b8Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      May 11, 2022 18:36:26.871653080 CEST192.168.2.68.8.8.80x8cfStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      May 11, 2022 18:34:52.306927919 CEST8.8.8.8192.168.2.60x6979No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:34:59.111686945 CEST8.8.8.8192.168.2.60x581bNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:35:06.545044899 CEST8.8.8.8192.168.2.60xfcc6No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:35:12.701590061 CEST8.8.8.8192.168.2.60xf6fcNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:35:19.753113031 CEST8.8.8.8192.168.2.60xbffNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:35:25.877197981 CEST8.8.8.8192.168.2.60x263No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:35:32.245639086 CEST8.8.8.8192.168.2.60x42baNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:35:39.201423883 CEST8.8.8.8192.168.2.60xcda1No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:35:46.681548119 CEST8.8.8.8192.168.2.60x9beaNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:35:58.932028055 CEST8.8.8.8192.168.2.60xd6ecNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:36:06.761792898 CEST8.8.8.8192.168.2.60x46f8No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:36:12.797620058 CEST8.8.8.8192.168.2.60xb4b2No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:36:20.825550079 CEST8.8.8.8192.168.2.60xa1b8No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                      May 11, 2022 18:36:26.889264107 CEST8.8.8.8192.168.2.60x8cfNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:1
                                      Start time:18:34:24
                                      Start date:11/05/2022
                                      Path:C:\Users\user\Desktop\QUOTATION.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\QUOTATION.exe"
                                      Imagebase:0x100000
                                      File size:707584 bytes
                                      MD5 hash:DBFFB4682E330D635295CCDD92FE99C4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.416586877.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.418666280.00000000035CB000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Reputation:low

                                      Target ID:5
                                      Start time:18:34:44
                                      Start date:11/05/2022
                                      Path:C:\Users\user\Desktop\QUOTATION.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\QUOTATION.exe
                                      Imagebase:0x650000
                                      File size:707584 bytes
                                      MD5 hash:DBFFB4682E330D635295CCDD92FE99C4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641608734.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.411957545.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641634528.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.640118033.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641805213.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641707073.0000000006D20000.00000004.00000001.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.638035787.0000000003B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641622424.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.411127213.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.630920607.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641872775.0000000006EE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641519626.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.640012845.0000000003D4E000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641679892.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.633949267.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.634509663.0000000002B68000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641594280.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.640953344.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641582210.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641008391.0000000005C60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.413349942.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641782260.0000000006E90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.412616907.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Reputation:low

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:9.1%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:79
                                        Total number of Limit Nodes:3
                                        execution_graph 11431 b1c138 11432 b1c19e 11431->11432 11436 b1c2f8 11432->11436 11439 b1c2e8 11432->11439 11433 b1c24d 11442 b1b69c 11436->11442 11440 b1b69c DuplicateHandle 11439->11440 11441 b1c326 11439->11441 11440->11441 11441->11433 11443 b1c360 DuplicateHandle 11442->11443 11444 b1c326 11443->11444 11444->11433 11445 b14e4c 11446 b14dd5 11445->11446 11448 b14e42 11446->11448 11449 b13f50 11446->11449 11450 b13f5b 11449->11450 11453 b149ac 11450->11453 11452 b155b5 11452->11448 11454 b149b7 11453->11454 11457 b149dc 11454->11457 11456 b1569a 11456->11452 11458 b149e7 11457->11458 11461 b14a0c 11458->11461 11460 b15799 11460->11456 11462 b14a17 11461->11462 11464 b1791e 11462->11464 11467 b19d00 11462->11467 11463 b1795c 11463->11460 11464->11463 11470 b1be70 11464->11470 11475 b19d38 11467->11475 11471 b1be91 11470->11471 11472 b1beb5 11471->11472 11498 b1c020 11471->11498 11502 b1c010 11471->11502 11472->11463 11478 b19e30 11475->11478 11476 b19d16 11476->11464 11479 b19e43 11478->11479 11480 b19e5b 11479->11480 11486 b1a0b8 11479->11486 11490 b1a0a8 11479->11490 11480->11476 11481 b19e53 11481->11480 11482 b1a058 GetModuleHandleW 11481->11482 11483 b1a085 11482->11483 11483->11476 11487 b1a0cc 11486->11487 11489 b1a0f1 11487->11489 11494 b198a0 11487->11494 11489->11481 11491 b1a0b9 11490->11491 11492 b198a0 LoadLibraryExW 11491->11492 11493 b1a0f1 11491->11493 11492->11493 11493->11481 11495 b1a298 LoadLibraryExW 11494->11495 11497 b1a311 11495->11497 11497->11489 11499 b1c02d 11498->11499 11500 b1c067 11499->11500 11506 b1b614 11499->11506 11500->11472 11503 b1c019 11502->11503 11504 b1c067 11503->11504 11505 b1b614 2 API calls 11503->11505 11504->11472 11505->11504 11507 b1b61f 11506->11507 11509 b1c958 11507->11509 11510 b1b6fc 11507->11510 11509->11509 11511 b1b707 11510->11511 11512 b14a0c 2 API calls 11511->11512 11513 b1c9c7 11511->11513 11512->11513 11517 b1eb38 11513->11517 11522 b1eb48 11513->11522 11514 b1ca00 11514->11509 11518 b1eb41 11517->11518 11519 b1eb85 11518->11519 11528 b1ee90 11518->11528 11531 b1ee80 11518->11531 11519->11514 11523 b1eb79 11522->11523 11525 b1ebc6 11522->11525 11524 b1eb85 11523->11524 11526 b1ee90 2 API calls 11523->11526 11527 b1ee80 2 API calls 11523->11527 11524->11514 11525->11514 11526->11525 11527->11525 11529 b19e30 LoadLibraryExW GetModuleHandleW 11528->11529 11530 b1ee99 11529->11530 11530->11519 11532 b1ee89 11531->11532 11533 b19e30 LoadLibraryExW GetModuleHandleW 11532->11533 11534 b1ee99 11532->11534 11533->11534 11534->11519

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 b19e30-b19e45 call b1983c 3 b19e47 0->3 4 b19e5b-b19e5f 0->4 55 b19e4d call b1a0b8 3->55 56 b19e4d call b1a0a8 3->56 5 b19e61-b19e6b 4->5 6 b19e73-b19eb4 4->6 5->6 11 b19ec1-b19ecf 6->11 12 b19eb6-b19ebe 6->12 7 b19e53-b19e55 7->4 8 b19f90-b1a050 7->8 48 b1a052-b1a055 8->48 49 b1a058-b1a083 GetModuleHandleW 8->49 13 b19ed1-b19ed6 11->13 14 b19ef3-b19ef5 11->14 12->11 16 b19ee1 13->16 17 b19ed8-b19edf call b19848 13->17 18 b19ef8-b19eff 14->18 20 b19ee3-b19ef1 16->20 17->20 21 b19f01-b19f09 18->21 22 b19f0c-b19f13 18->22 20->18 21->22 25 b19f20-b19f29 call b19858 22->25 26 b19f15-b19f1d 22->26 31 b19f36-b19f3b 25->31 32 b19f2b-b19f33 25->32 26->25 33 b19f59-b19f5d 31->33 34 b19f3d-b19f44 31->34 32->31 53 b19f60 call b1a3b0 33->53 54 b19f60 call b1a3c0 33->54 34->33 35 b19f46-b19f56 call b19868 call b19878 34->35 35->33 38 b19f63-b19f66 41 b19f89-b19f8f 38->41 42 b19f68-b19f86 38->42 42->41 48->49 50 b1a085-b1a08b 49->50 51 b1a08c-b1a0a0 49->51 50->51 53->38 54->38 55->7 56->7
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00B1A076
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: f428946863b910df3d42805357b006d357824c27ffb15d6b42673c41f0601c37
                                        • Instruction ID: 8a48ccebb5fd9375974deb9011f8a4b68623e13479a3b550ece3d55f3036ab6b
                                        • Opcode Fuzzy Hash: f428946863b910df3d42805357b006d357824c27ffb15d6b42673c41f0601c37
                                        • Instruction Fuzzy Hash: 66713470A00B458FDB24CF2AD05579ABBF1FF89304F50896DE44ADBA40D774E989CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 57 b1b69c-b1c3f4 DuplicateHandle 59 b1c3f6-b1c3fc 57->59 60 b1c3fd-b1c41a 57->60 59->60
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00B1C326,?,?,?,?,?), ref: 00B1C3E7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 9ff66c1e73d8d3681170176cef404e228273ac66a571430b167a3da30266dbc6
                                        • Instruction ID: 97d360e705751db1bc882eda502c569db03519c6afdeb68cd5eced6bc9329434
                                        • Opcode Fuzzy Hash: 9ff66c1e73d8d3681170176cef404e228273ac66a571430b167a3da30266dbc6
                                        • Instruction Fuzzy Hash: D721E3B59042499FDB10CF9AD584ADEBBF4EB48324F14846AE914A3310D374A994CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 63 b1c358-b1c3f4 DuplicateHandle 64 b1c3f6-b1c3fc 63->64 65 b1c3fd-b1c41a 63->65 64->65
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00B1C326,?,?,?,?,?), ref: 00B1C3E7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: e343700f4ea663eca2000a810d7a8e0a8d9c332548e3d40c85832f0cfb121594
                                        • Instruction ID: ac695125e56156c7787fe0517425ec3393d2c664fdbaff4a3fdfbd690129e9a3
                                        • Opcode Fuzzy Hash: e343700f4ea663eca2000a810d7a8e0a8d9c332548e3d40c85832f0cfb121594
                                        • Instruction Fuzzy Hash: 1821E3B59002499FDB10CFAAD584ADEFFF4FB48324F14845AE924A7310D374A995CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 68 b198a0-b1a2d8 70 b1a2e0-b1a30f LoadLibraryExW 68->70 71 b1a2da-b1a2dd 68->71 72 b1a311-b1a317 70->72 73 b1a318-b1a335 70->73 71->70 72->73
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B1A0F1,00000800,00000000,00000000), ref: 00B1A302
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 166870b306ffd7ec19c2f37aa97009a45856409e8548b03905708d48f10f6602
                                        • Instruction ID: 239b96cfba55d32b499f91b272a2ae58888cbd2f713fe7d33ca7402ae0063910
                                        • Opcode Fuzzy Hash: 166870b306ffd7ec19c2f37aa97009a45856409e8548b03905708d48f10f6602
                                        • Instruction Fuzzy Hash: DB1106B29043099FDB10CF9AD544ADEFBF4EB48324F14846AD415A7200C375A985CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 76 b1a290-b1a2d8 77 b1a2e0-b1a30f LoadLibraryExW 76->77 78 b1a2da-b1a2dd 76->78 79 b1a311-b1a317 77->79 80 b1a318-b1a335 77->80 78->77 79->80
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B1A0F1,00000800,00000000,00000000), ref: 00B1A302
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 901bc3414dfd6b87a6c4be94de9d423d1c3befcc5969b6ab1b8342014940473c
                                        • Instruction ID: 6831f3093d15c403ec2eb7c81906f50c8d498041582dab8cbe62bb2663f9a877
                                        • Opcode Fuzzy Hash: 901bc3414dfd6b87a6c4be94de9d423d1c3befcc5969b6ab1b8342014940473c
                                        • Instruction Fuzzy Hash: 831114B2D043498FDB10CFAAD444ADEFBF4EB48324F15856AD469A7200C374A985CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 83 b1a009-b1a050 84 b1a052-b1a055 83->84 85 b1a058-b1a083 GetModuleHandleW 83->85 84->85 86 b1a085-b1a08b 85->86 87 b1a08c-b1a0a0 85->87 86->87
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00B1A076
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: fd2fcf3fa0aa13be7bfdaa6ecaa1bcc6ada97437653d902e4acc918f92a06aea
                                        • Instruction ID: 491aac5d8c4f4dd77e283286020d90580b0063c233c7297d369dd1461d6a61df
                                        • Opcode Fuzzy Hash: fd2fcf3fa0aa13be7bfdaa6ecaa1bcc6ada97437653d902e4acc918f92a06aea
                                        • Instruction Fuzzy Hash: BD1104B1C016498FDB10CF9AD444BDEFBF4EB49324F10856AD829A7600C375A58ACFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 89 b1a010-b1a050 90 b1a052-b1a055 89->90 91 b1a058-b1a083 GetModuleHandleW 89->91 90->91 92 b1a085-b1a08b 91->92 93 b1a08c-b1a0a0 91->93 92->93
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00B1A076
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: b8d203c3509d4e3921f6685915ea8565c71ef12a3ada6d7ba0228c24a45810c1
                                        • Instruction ID: 0221f694185f8fa29778634e74d418040996648653394ecf76c32fddfdd4a248
                                        • Opcode Fuzzy Hash: b8d203c3509d4e3921f6685915ea8565c71ef12a3ada6d7ba0228c24a45810c1
                                        • Instruction Fuzzy Hash: 471113B1C006498FCB10CF9AC448BDEFBF4EB88324F10855AD829B7600C375A589CFA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415628982.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_83d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 02ee4af0b08e791b2eda805907a97fdb75809abd2dc8ad5a4915daaa94a5d54e
                                        • Instruction ID: 6e8978eb0af2b1d2ea98dc59a3e93abc2b6e21c738b160d848f34282a797326d
                                        • Opcode Fuzzy Hash: 02ee4af0b08e791b2eda805907a97fdb75809abd2dc8ad5a4915daaa94a5d54e
                                        • Instruction Fuzzy Hash: EC2124B1504344DFDB01DF00E9C0B26BB65FBC4328F248568E9058B246C336D856C7E2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415628982.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_83d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6e7d002541c633feb46689234a1bb2e62d1b318be325b33f1dec39f9762d77a4
                                        • Instruction ID: 4f21addc19b30f0657e34230ab0b66e023513d112addc1b74b8c5f443172816c
                                        • Opcode Fuzzy Hash: 6e7d002541c633feb46689234a1bb2e62d1b318be325b33f1dec39f9762d77a4
                                        • Instruction Fuzzy Hash: FE21F5B2504344DFDB15DF10E9C0B26BB65FBD4328F24C569E9098B246C33AE856D7E2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415655493.000000000084D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0084D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_84d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 20727b25bf76346830efe2164ed8b2668274bb59327f1ad004f885da1ee76f9d
                                        • Instruction ID: d898c4fc3bd3e30643f89f7859f0fdc204c452da01ed479ba0202688b296e740
                                        • Opcode Fuzzy Hash: 20727b25bf76346830efe2164ed8b2668274bb59327f1ad004f885da1ee76f9d
                                        • Instruction Fuzzy Hash: 0D21F975608348DFDB15DF10D9C0B26BBA5FB84318F24CA6DE9099B346C37AE846CB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415655493.000000000084D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0084D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_84d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a31d5aee3854306f5a10a56051c19f5aeea930d456ef0a9d08ca46ca07e9371
                                        • Instruction ID: 69f4e80dce24abd8837a10c037c931bf2231bb966e5f47f3a5c72734742f0105
                                        • Opcode Fuzzy Hash: 0a31d5aee3854306f5a10a56051c19f5aeea930d456ef0a9d08ca46ca07e9371
                                        • Instruction Fuzzy Hash: B821D775508748DFDB14DF14D9C4B16BB65FB84328F24C969E9098B346C33AD847CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415628982.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_83d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e12181f863a64cfe501b52ed0dc6072a2b21c790c3d1261feacc9d3857e76c6
                                        • Instruction ID: c839012f0d18c463c1b9189110ef34062cc39e996e9c09b58b8a148d13db6bed
                                        • Opcode Fuzzy Hash: 9e12181f863a64cfe501b52ed0dc6072a2b21c790c3d1261feacc9d3857e76c6
                                        • Instruction Fuzzy Hash: BD11B176904384CFCB12CF14D5C4B16BF72FB94324F24C6A9D8054B656C336D85ACBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415628982.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_83d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e12181f863a64cfe501b52ed0dc6072a2b21c790c3d1261feacc9d3857e76c6
                                        • Instruction ID: a4606f18cfe4eacd0e0ccfde3ac22b8172df3c52a56bd4dd3efc80ba11d310a3
                                        • Opcode Fuzzy Hash: 9e12181f863a64cfe501b52ed0dc6072a2b21c790c3d1261feacc9d3857e76c6
                                        • Instruction Fuzzy Hash: 69118176504284DFCB16CF10D5C4B16BF71FB94324F24C6A9D8454B656C33AE85ACBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415655493.000000000084D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0084D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_84d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 151ebce1a8b1bb49a373537606f5c99241a5b55cc1d685712532943faccb752d
                                        • Instruction ID: 4468654d56db7566f7a35b69469a12118776113e1f2b46ea9de9b8cf2bb4b042
                                        • Opcode Fuzzy Hash: 151ebce1a8b1bb49a373537606f5c99241a5b55cc1d685712532943faccb752d
                                        • Instruction Fuzzy Hash: 9811BB75504788CFCB11CF10D5C4B15BBA1FB84324F28C6AAD8098B656C33AD84ACBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415655493.000000000084D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0084D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_84d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 151ebce1a8b1bb49a373537606f5c99241a5b55cc1d685712532943faccb752d
                                        • Instruction ID: 7a56e4252892625d8f30c783ecb6cbb2a755b91a56171ed516232cd268d0c352
                                        • Opcode Fuzzy Hash: 151ebce1a8b1bb49a373537606f5c99241a5b55cc1d685712532943faccb752d
                                        • Instruction Fuzzy Hash: 13118B75904388DFCB12CF10D5C4B15BBA1FB84324F28C6A9D8498B656C37AE85ACB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415628982.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_83d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 33143a459eb9721d8f88e176fea82eec50ddfed1948d0c42c5ce750d227308f3
                                        • Instruction ID: fa7d31d3d94a3a1dfd649c0d91a4c378662018454cd9dfde258032e6fbe14561
                                        • Opcode Fuzzy Hash: 33143a459eb9721d8f88e176fea82eec50ddfed1948d0c42c5ce750d227308f3
                                        • Instruction Fuzzy Hash: 7401267140C3849EE7105E25EDC4B66FB98FF81378F18C51AEE049B286D3789884CAF1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.415628982.000000000083D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_83d000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f095fdfa1d6e7705d7ef3776300d3b416c9f7365bc4e69ec15050ff76cc17d01
                                        • Instruction ID: 75dc99d25cd3dc3819d93b5d8dd2bfcca730ecce9ea5912ba93f11753d68072e
                                        • Opcode Fuzzy Hash: f095fdfa1d6e7705d7ef3776300d3b416c9f7365bc4e69ec15050ff76cc17d01
                                        • Instruction Fuzzy Hash: 49F096714083949EEB118E15DCC8B66FFA8FB91774F18C45AED085B386C3799C44CAB1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7110a47deea5cb0bb71e9303a8ca9f56dbeaf34b9436d7455dc260ec362182e6
                                        • Instruction ID: 61661d4894bec529e292326c125211ec8ad8a9ba3da4482d00a92a5a08a621d7
                                        • Opcode Fuzzy Hash: 7110a47deea5cb0bb71e9303a8ca9f56dbeaf34b9436d7455dc260ec362182e6
                                        • Instruction Fuzzy Hash: 6B1285F1411F46CAD730CF65ED9828D7BA1B745328BB04708D2616BAF1DBB8118AEF84
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e5c3f2155261a7be2bcd0bf391cd6222b9de7f430676e674a458d9094d19b355
                                        • Instruction ID: 3bbac37078da0eb18e1aca570262f1b18791be1a0f45ec9982e9e65b8d622b12
                                        • Opcode Fuzzy Hash: e5c3f2155261a7be2bcd0bf391cd6222b9de7f430676e674a458d9094d19b355
                                        • Instruction Fuzzy Hash: 2CA16E32E002198FCF05DFA5D8445DEBBF2FF85300B5585BAE915AB225EB35E985CB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.416122099.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_b10000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b68d253c98a67a78c159e84cf1dc5a973714bc7065d7233c91ac16e63553b0e
                                        • Instruction ID: 13de532bfa8cee1ecb7118179b7a5ccbdcfdef2e9b96aae5e786d9c36eaaca3a
                                        • Opcode Fuzzy Hash: 7b68d253c98a67a78c159e84cf1dc5a973714bc7065d7233c91ac16e63553b0e
                                        • Instruction Fuzzy Hash: F7C1F8B1811B46CAD720CF65ED9828D7BA1BB85328F704708D1616B6F0DFB8118AEF84
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:10.9%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:112
                                        Total number of Limit Nodes:10
                                        execution_graph 15425 292b6d0 GetCurrentProcess 15426 292b743 15425->15426 15427 292b74a GetCurrentThread 15425->15427 15426->15427 15428 292b780 15427->15428 15429 292b787 GetCurrentProcess 15427->15429 15428->15429 15430 292b7bd 15429->15430 15431 292b7e5 GetCurrentThreadId 15430->15431 15432 292b816 15431->15432 15433 29292f0 15436 29293e8 15433->15436 15434 29292ff 15437 29293fb 15436->15437 15438 2929413 15437->15438 15444 2929670 15437->15444 15448 2929660 15437->15448 15438->15434 15439 292940b 15439->15438 15440 2929610 GetModuleHandleW 15439->15440 15441 292963d 15440->15441 15441->15434 15445 2929684 15444->15445 15447 29296a9 15445->15447 15452 2928768 15445->15452 15447->15439 15449 2929684 15448->15449 15450 29296a9 15449->15450 15451 2928768 LoadLibraryExW 15449->15451 15450->15439 15451->15450 15453 2929850 LoadLibraryExW 15452->15453 15455 29298c9 15453->15455 15455->15447 15554 292fe40 SetWindowLongW 15555 292feac 15554->15555 15556 5ee1a1c 15557 5ee3058 DnsQuery_A 15556->15557 15559 5ee3192 15557->15559 15560 292bdc1 15561 292bd68 DuplicateHandle 15560->15561 15563 292bdcf 15560->15563 15562 292bd96 15561->15562 15456 5ee0968 15457 5ee0978 15456->15457 15458 5ee09e5 15457->15458 15460 5ee0c38 15457->15460 15461 5ee0c8f 15460->15461 15462 5ee0c48 15460->15462 15465 5ee0d10 15461->15465 15462->15458 15463 5ee0c9c 15463->15458 15466 5ee0d63 15465->15466 15467 5ee0dcf GetCurrentThreadId 15466->15467 15468 5ee0d9f 15466->15468 15467->15468 15469 2926758 15472 2926344 15469->15472 15471 2926766 15473 292634f 15472->15473 15476 2926394 15473->15476 15475 292688d 15475->15471 15477 292639f 15476->15477 15480 29263c4 15477->15480 15479 2926962 15479->15475 15481 29263cf 15480->15481 15484 29263f4 15481->15484 15483 2926a62 15483->15479 15486 29263ff 15484->15486 15485 29271bc 15485->15483 15486->15485 15488 292b406 15486->15488 15489 292b429 15488->15489 15490 292b44d 15489->15490 15493 292b5ab 15489->15493 15497 292b5b8 15489->15497 15490->15485 15495 292b5c5 15493->15495 15494 292b5ff 15494->15490 15495->15494 15501 292a0ec 15495->15501 15498 292b5c5 15497->15498 15499 292b5ff 15498->15499 15500 292a0ec 6 API calls 15498->15500 15499->15490 15500->15499 15503 292a0f7 15501->15503 15502 292c2f8 15503->15502 15505 292b904 15503->15505 15506 292b90f 15505->15506 15507 292c367 15506->15507 15508 29263f4 6 API calls 15506->15508 15515 292c3d3 15507->15515 15521 292c3e0 15507->15521 15508->15507 15509 292c375 15513 292e0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW 15509->15513 15514 292e0d8 LoadLibraryExW GetModuleHandleW CreateWindowExW 15509->15514 15510 292c3a0 15510->15502 15513->15510 15514->15510 15516 292c40e 15515->15516 15518 292c437 15516->15518 15520 292c4df 15516->15520 15527 292b9a0 15516->15527 15519 292c4da KiUserCallbackDispatcher 15518->15519 15518->15520 15519->15520 15522 292c40e 15521->15522 15523 292b9a0 GetFocus 15522->15523 15524 292c437 15522->15524 15526 292c4df 15522->15526 15523->15524 15525 292c4da KiUserCallbackDispatcher 15524->15525 15524->15526 15525->15526 15528 292b9ab 15527->15528 15529 292ba14 GetFocus 15528->15529 15530 292c9f5 15528->15530 15529->15530 15530->15518 15531 5ee0ee0 15532 5ee0eed 15531->15532 15533 5ee0ef1 15531->15533 15536 5ee10f8 15533->15536 15537 5ee1100 15536->15537 15541 292ee00 15537->15541 15545 292edef 15537->15545 15542 292ee2a 15541->15542 15543 292eed1 15542->15543 15549 292faa0 15542->15549 15547 292ee2a 15545->15547 15546 292eed1 15546->15546 15547->15546 15548 292faa0 CreateWindowExW 15547->15548 15548->15546 15550 292fb8a 15549->15550 15551 292fbec CreateWindowExW 15549->15551 15550->15543 15553 292fd1c 15551->15553

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0292B730
                                        • GetCurrentThread.KERNEL32 ref: 0292B76D
                                        • GetCurrentProcess.KERNEL32 ref: 0292B7AA
                                        • GetCurrentThreadId.KERNEL32 ref: 0292B803
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 7e0d5cfc76b5c790f0ad6706efc967aa098e8b12957c49334b5b0444c663ff2a
                                        • Instruction ID: e2280b3e5fa15d798d22975ce5462c90b1b6c1a0483ed602fa29ca60f1fcbf69
                                        • Opcode Fuzzy Hash: 7e0d5cfc76b5c790f0ad6706efc967aa098e8b12957c49334b5b0444c663ff2a
                                        • Instruction Fuzzy Hash: 125167B4E053448FDB10CFA9C6887DEBBF5EF48318F248499E059A7351C7745889CB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0292B730
                                        • GetCurrentThread.KERNEL32 ref: 0292B76D
                                        • GetCurrentProcess.KERNEL32 ref: 0292B7AA
                                        • GetCurrentThreadId.KERNEL32 ref: 0292B803
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 67c5a2ceb29fabf8c8c9f7f4e8c75fcac322db8cdd967e26b87aa9f80a130674
                                        • Instruction ID: 870d018a7baf9de4e8daffd23f9fb42909807688d580e98e5290d07e883684c4
                                        • Opcode Fuzzy Hash: 67c5a2ceb29fabf8c8c9f7f4e8c75fcac322db8cdd967e26b87aa9f80a130674
                                        • Instruction Fuzzy Hash: E35144B4E057098FDB10CFA9C648BAEBBF5EF48328F208459E019A7350C7745889CF62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0292962E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID: HR$HR
                                        • API String ID: 4139908857-4037001784
                                        • Opcode ID: c03fddc99f3ba96a242348fbe60bc17a737e475b84debb09e2323cf6c8a983c3
                                        • Instruction ID: 65875e639be8241d26a784d2326cff0f85295c4011ad2d6d33a08be6bbd43fe9
                                        • Opcode Fuzzy Hash: c03fddc99f3ba96a242348fbe60bc17a737e475b84debb09e2323cf6c8a983c3
                                        • Instruction Fuzzy Hash: 17713470A00B158FE724DF2AD04179AB7F5BF88314F108A2DD48AD7A54D734E849CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 232 292faa0-292fb88 233 292fb8a-292fbd8 call 292da04 232->233 234 292fbec-292fc5e 232->234 238 292fbdd-292fbde 233->238 236 292fc60-292fc66 234->236 237 292fc69-292fc70 234->237 236->237 239 292fc72-292fc78 237->239 240 292fc7b-292fd1a CreateWindowExW 237->240 239->240 242 292fd23-292fd5b 240->242 243 292fd1c-292fd22 240->243 247 292fd68 242->247 248 292fd5d-292fd60 242->248 243->242 249 292fd69 247->249 248->247 249->249
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0292FD0A
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 7fa250baf904ceead55257b89635b44876000a0aa43a37b17481909140bdf8cd
                                        • Instruction ID: 7ae6d45e39f8fb817087f6de4cbf10d5561f315fce688973bb896873e745059a
                                        • Opcode Fuzzy Hash: 7fa250baf904ceead55257b89635b44876000a0aa43a37b17481909140bdf8cd
                                        • Instruction Fuzzy Hash: 989170718093889FDB02CFA5C895ADDBFB1EF4A314F19819AE8849B262C734545ACF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 250 5ee1a1c-5ee30cb 253 5ee30cd-5ee30d7 250->253 254 5ee3104-5ee3190 DnsQuery_A 250->254 253->254 255 5ee30d9-5ee30db 253->255 263 5ee3199-5ee31e6 254->263 264 5ee3192-5ee3198 254->264 256 5ee30fe-5ee3101 255->256 257 5ee30dd-5ee30e7 255->257 256->254 259 5ee30eb-5ee30fa 257->259 260 5ee30e9 257->260 259->259 261 5ee30fc 259->261 260->259 261->256 269 5ee31e8-5ee31ec 263->269 270 5ee31f6-5ee31fa 263->270 264->263 269->270 271 5ee31ee 269->271 272 5ee31fc-5ee31ff 270->272 273 5ee3209-5ee320d 270->273 271->270 272->273 274 5ee321e 273->274 275 5ee320f-5ee321b 273->275 275->274
                                        APIs
                                        • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 05EE3180
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.641159533.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: true
                                        • Associated: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_5ed0000_QUOTATION.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Query_
                                        • String ID:
                                        • API String ID: 428220571-0
                                        • Opcode ID: c8df85ed526f713fce8141df8cfb7557cfe0e4f8129a2aa5043122bf756bfa70
                                        • Instruction ID: 350dca8f3a73ab6b631843b760a0664f7f2a17a234316f52835948193bcdb2b4
                                        • Opcode Fuzzy Hash: c8df85ed526f713fce8141df8cfb7557cfe0e4f8129a2aa5043122bf756bfa70
                                        • Instruction Fuzzy Hash: CB514370D143089FDF10CFA9C8806DEBBB1FF48318F20852AE855AB250DB74A846CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 277 292fbf8-292fc5e 278 292fc60-292fc66 277->278 279 292fc69-292fc70 277->279 278->279 280 292fc72-292fc78 279->280 281 292fc7b-292fcb3 279->281 280->281 282 292fcbb-292fd1a CreateWindowExW 281->282 283 292fd23-292fd5b 282->283 284 292fd1c-292fd22 282->284 288 292fd68 283->288 289 292fd5d-292fd60 283->289 284->283 290 292fd69 288->290 289->288 290->290
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0292FD0A
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 2189e85f03dc15f3ca0b80d6ad96b171d838285129b90615af83c795e2049010
                                        • Instruction ID: 63d21e3e9fd96050c92da8f5f2e0120fbc9fd21fb2e2affae8367d2e6aed80cd
                                        • Opcode Fuzzy Hash: 2189e85f03dc15f3ca0b80d6ad96b171d838285129b90615af83c795e2049010
                                        • Instruction Fuzzy Hash: 8E41C1B1D00319DFDB14CFA9C884ADEBBB5FF48314F24852AE819AB214D7749885CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 309 5ee0d10-5ee0d7c 313 5ee0d7e-5ee0d87 309->313 314 5ee0d89-5ee0d9d 309->314 317 5ee0dc5-5ee0dc7 313->317 320 5ee0d9f-5ee0db7 314->320 321 5ee0db9-5ee0dc3 314->321 319 5ee0dcf-5ee0dfd GetCurrentThreadId 317->319 322 5ee0dff-5ee0e05 319->322 323 5ee0e06-5ee0e2b 319->323 324 5ee0e2d-5ee0e31 320->324 321->317 322->323 323->324 326 5ee0e3c 324->326 327 5ee0e33 324->327 327->326
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 05EE0DE9
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.641159533.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: true
                                        • Associated: 00000005.00000002.641142160.0000000005ED0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_5ed0000_QUOTATION.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentThread
                                        • String ID:
                                        • API String ID: 2882836952-0
                                        • Opcode ID: c8182a6e330e0ecc50521d140f63c5b55af43420f6e44cc86c8556bac92f2114
                                        • Instruction ID: 4678123e4f88cbc84837717ad689bce51835ad46cae066fcd1ae96af90d71c2a
                                        • Opcode Fuzzy Hash: c8182a6e330e0ecc50521d140f63c5b55af43420f6e44cc86c8556bac92f2114
                                        • Instruction Fuzzy Hash: A8318BB4E14218DFDB14DF68C488BAEBBF5EF48714F148029E446A7360DBB4A846CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 291 292bdc1-292bdcd 292 292bd68-292bd94 DuplicateHandle 291->292 293 292bdcf-292bddb 291->293 295 292bd96-292bd9c 292->295 296 292bd9d-292bdba 292->296 294 292bde6-292beee 293->294 295->296
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0292BD87
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 0455c9b04a8728e2635ee7e1c053966480daad6bad925b255cffd09d7bd88d11
                                        • Instruction ID: 4d4125b44150fbfaa9c6f7c87943941e5860ef87309a3db34b3f2ae2420679f1
                                        • Opcode Fuzzy Hash: 0455c9b04a8728e2635ee7e1c053966480daad6bad925b255cffd09d7bd88d11
                                        • Instruction Fuzzy Hash: 77414CBCA80244DFE7419F74F648BAA7BB5EB88301F104629EA168B7C5DB7518A5CF10
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 329 292bcf9-292bd65 330 292bd68-292bd94 DuplicateHandle 329->330 331 292bd96-292bd9c 330->331 332 292bd9d-292bdba 330->332 331->332
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0292BD87
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: a43a6a552496da2777041058040d0742d27e02b60d6cb92dfdbf2222e80d39e2
                                        • Instruction ID: 759db7235f02bd6273e15e3af476aa385cdfe0a1f55cd59ba22474888866fd03
                                        • Opcode Fuzzy Hash: a43a6a552496da2777041058040d0742d27e02b60d6cb92dfdbf2222e80d39e2
                                        • Instruction Fuzzy Hash: 312103B5D012099FCB00CFA9D584AEEBFF4EF48324F14841AE958A3310C378A955CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 335 292bd00-292bd65 336 292bd68-292bd94 DuplicateHandle 335->336 337 292bd96-292bd9c 336->337 338 292bd9d-292bdba 336->338 337->338
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0292BD87
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 861cf439e5aca6d8c8cfe2cec57801f0fd18fba610cbf2dc7bbb46f3749a92ef
                                        • Instruction ID: c2e055a42000c361a6679b4f5ac299823f3c85a7cf98015079883bf23461d647
                                        • Opcode Fuzzy Hash: 861cf439e5aca6d8c8cfe2cec57801f0fd18fba610cbf2dc7bbb46f3749a92ef
                                        • Instruction Fuzzy Hash: E021C4B5D04219DFDB10CF9AD584ADEBBF8FB48324F14841AE958A3310D378A955CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 341 2929849-2929890 342 2929892-2929895 341->342 343 2929898-29298c7 LoadLibraryExW 341->343 342->343 344 29298d0-29298ed 343->344 345 29298c9-29298cf 343->345 345->344
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,029296A9,00000800,00000000,00000000), ref: 029298BA
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 20b7c08ae923ecf9e64e87aae67378c7bb4d35b9aa1fc84b74a212721cca1b1f
                                        • Instruction ID: 81047cb278e248bdabd1ebf4bc1a77c0ed485286ce777e23d182f1c11c0e9d9d
                                        • Opcode Fuzzy Hash: 20b7c08ae923ecf9e64e87aae67378c7bb4d35b9aa1fc84b74a212721cca1b1f
                                        • Instruction Fuzzy Hash: 501106B6D042098FDB10CFAAC444ADEFBF4AB48324F14842ED559A7200C375A54ACFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 348 2928768-2929890 350 2929892-2929895 348->350 351 2929898-29298c7 LoadLibraryExW 348->351 350->351 352 29298d0-29298ed 351->352 353 29298c9-29298cf 351->353 353->352
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,029296A9,00000800,00000000,00000000), ref: 029298BA
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 8827896e847b3ab6bdeec2396eff0e6dfbe4eb48e46864b7c6125b34cf258934
                                        • Instruction ID: 064cf548fe6ae2abc2ba9e669f817b43be48e5594aeddcac91c051d4edb96f8b
                                        • Opcode Fuzzy Hash: 8827896e847b3ab6bdeec2396eff0e6dfbe4eb48e46864b7c6125b34cf258934
                                        • Instruction Fuzzy Hash: 541103B6D042098FDB10CF9AC444BDEFBF8EB48324F14842EE519A7600C374A949CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0292962E
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: bae90b532ef092564dcc7d9b7d44fd5be7f64145ee5b1b6ae63542b9ae849700
                                        • Instruction ID: 3cd0d6e44bf2e4d0459a60ce36ba6464b25ef90a2a3419ec962705bb0514e770
                                        • Opcode Fuzzy Hash: bae90b532ef092564dcc7d9b7d44fd5be7f64145ee5b1b6ae63542b9ae849700
                                        • Instruction Fuzzy Hash: 6811E3B5D006598FDB10CF9AC444BDEFBF8AB88324F14845AD469A7600C374A549CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetWindowLongW.USER32(?,?,?), ref: 0292FE9D
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: LongWindow
                                        • String ID:
                                        • API String ID: 1378638983-0
                                        • Opcode ID: 4aeac2578de66018158898a436740515a714604d9174322910aae0c143c2d07a
                                        • Instruction ID: 9a8fdc5b32c995ef13dd5301802b336f37bebf4d9b2c76279787bd385e6f92b8
                                        • Opcode Fuzzy Hash: 4aeac2578de66018158898a436740515a714604d9174322910aae0c143c2d07a
                                        • Instruction Fuzzy Hash: 301103B5900249DFDB10CF99D585BDEBBF8EB48324F14845AD858A7701C374A985CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetWindowLongW.USER32(?,?,?), ref: 0292FE9D
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632705997.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2920000_QUOTATION.jbxd
                                        Similarity
                                        • API ID: LongWindow
                                        • String ID:
                                        • API String ID: 1378638983-0
                                        • Opcode ID: aa8dd0f6252bb9e217e236e10665c09bc52f8eb64320497b09c56dba475bd4d6
                                        • Instruction ID: 569c382d2667c7a0651d220eafc74d530eec5a3a04511ffc78660de02b7aa1d1
                                        • Opcode Fuzzy Hash: aa8dd0f6252bb9e217e236e10665c09bc52f8eb64320497b09c56dba475bd4d6
                                        • Instruction Fuzzy Hash: 031103B59002098FDB10CF99D584BDEBBF8EB48324F10845AD858A3700C374A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632168333.0000000000EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EBD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_ebd000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad9a37c857a7e32b5b7e06a7407e2458dd5173e28d8603caa0f60e49023643d1
                                        • Instruction ID: ebc48557bf819da2a428f4f93c62c3ade56c5be6d9a46ba0a2b92b474439a54a
                                        • Opcode Fuzzy Hash: ad9a37c857a7e32b5b7e06a7407e2458dd5173e28d8603caa0f60e49023643d1
                                        • Instruction Fuzzy Hash: 132145B1508244DFDB25DF00DDC0BA7BF65FB88328F24C568E9095B246D336D846CBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632168333.0000000000EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EBD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_ebd000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 603940e28dfd19a16ea0f1881ebe301b52f530d536dd710d7b91c4940850b4ac
                                        • Instruction ID: e5b0a79dae4d87cc14128084342f57077a4b19dea98f6a8871dc02ace4817e37
                                        • Opcode Fuzzy Hash: 603940e28dfd19a16ea0f1881ebe301b52f530d536dd710d7b91c4940850b4ac
                                        • Instruction Fuzzy Hash: CC2167B1508244DFCB01DF10DDC0BA7BBA5FB84328F24C569E9096B246D336E856CBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632206369.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_ecd000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e146176480dc78e360b1e6f2debf0b1f5f17b78a6983d80c6c413bcff90863e
                                        • Instruction ID: 18e3df07d4fdf7722f1f56ef9d4a0486af1bc661df01c4e2eac719cf7eb40910
                                        • Opcode Fuzzy Hash: 1e146176480dc78e360b1e6f2debf0b1f5f17b78a6983d80c6c413bcff90863e
                                        • Instruction Fuzzy Hash: 9B21C175508244DFCB14DF18DAC1F16BBA6EB84328F24C97DE9095B246C33BD847CAA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632206369.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_ecd000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 27aa1812f68f8b976656416a1ed815923d2c08f5819b2cb35b14d61443399016
                                        • Instruction ID: b067445403a8b1439750afbea423a5f55db05a8a39e98d97230259d82f3ae72d
                                        • Opcode Fuzzy Hash: 27aa1812f68f8b976656416a1ed815923d2c08f5819b2cb35b14d61443399016
                                        • Instruction Fuzzy Hash: 00217F755093808FDB12CF24D990B15BF71EB46214F28C5EAD8498B697C33B980BCB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632168333.0000000000EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EBD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_ebd000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e12181f863a64cfe501b52ed0dc6072a2b21c790c3d1261feacc9d3857e76c6
                                        • Instruction ID: cded3a7ea5b6f40dd503190b8f4042d0f58a85ee0f062299caa904a269d2f8f7
                                        • Opcode Fuzzy Hash: 9e12181f863a64cfe501b52ed0dc6072a2b21c790c3d1261feacc9d3857e76c6
                                        • Instruction Fuzzy Hash: 68113872404280CFCF12CF10D9C0B56BF71FB84328F24C6A9D8040B616C33AE85ACBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000005.00000002.632168333.0000000000EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EBD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_ebd000_QUOTATION.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e12181f863a64cfe501b52ed0dc6072a2b21c790c3d1261feacc9d3857e76c6
                                        • Instruction ID: 52bcfe877a426cf803a88a54547647d8443f018ec60793742f6648f20444dba5
                                        • Opcode Fuzzy Hash: 9e12181f863a64cfe501b52ed0dc6072a2b21c790c3d1261feacc9d3857e76c6
                                        • Instruction Fuzzy Hash: FF11E676908284CFCF12CF14D9C4B56BF71FB84328F24C6A9D9051B656D336D85ACBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%