Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MARIAM HONAINE'S CV.exe

Overview

General Information

Sample Name:MARIAM HONAINE'S CV.exe
Analysis ID:625073
MD5:06981ba465eb7eca5e8da7572511e3d1
SHA1:75e5740ef54f5c7b4df89589423ad3fea84dbac2
SHA256:dd810d37c396be1e34d2fe8b76c5ff30c17b6bb64afcc1c682182fb6934a3f60
Tags:exe
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • MARIAM HONAINE'S CV.exe (PID: 7152 cmdline: "C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe" MD5: 06981BA465EB7ECA5E8DA7572511E3D1)
    • MARIAM HONAINE'S CV.exe (PID: 6348 cmdline: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe MD5: 06981BA465EB7ECA5E8DA7572511E3D1)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "fe56abb4-cb76-44f1-89b4-7bb11730", "Group": "Default", "Domain1": "deranano2.ddns.net", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000000.00000002.419788610.0000000003478000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 22 entries
      SourceRuleDescriptionAuthorStrings
      4.0.MARIAM HONAINE'S CV.exe.400000.6.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      4.0.MARIAM HONAINE'S CV.exe.400000.6.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      4.0.MARIAM HONAINE'S CV.exe.400000.6.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        4.0.MARIAM HONAINE'S CV.exe.400000.6.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0xfef5:$x1: NanoCore Client
        • 0xff05:$x1: NanoCore Client
        • 0x1014d:$x2: NanoCore.ClientPlugin
        • 0x1018d:$x3: NanoCore.ClientPluginHost
        • 0x10142:$i1: IClientApp
        • 0x10163:$i2: IClientData
        • 0x1016f:$i3: IClientNetwork
        • 0x1017e:$i4: IClientAppHost
        • 0x101a7:$i5: IClientDataHost
        • 0x101b7:$i6: IClientLoggingHost
        • 0x101ca:$i7: IClientNetworkHost
        • 0x101dd:$i8: IClientUIHost
        • 0x101eb:$i9: IClientNameObjectCollection
        • 0x10207:$i10: IClientReadOnlyNameObjectCollection
        • 0xff54:$s1: ClientPlugin
        • 0x10156:$s1: ClientPlugin
        • 0x1064a:$s2: EndPoint
        • 0x10653:$s3: IPAddress
        • 0x1065d:$s4: IPEndPoint
        • 0x12093:$s6: get_ClientSettings
        • 0x12637:$s7: get_Connected
        4.0.MARIAM HONAINE'S CV.exe.400000.6.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        Click to see the 45 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe, ProcessId: 6348, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe, ProcessId: 6348, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe, ProcessId: 6348, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe, ProcessId: 6348, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Timestamp:212.193.30.204192.168.2.61187497802810290 05/12/22-11:46:21.496806
        SID:2810290
        Source Port:1187
        Destination Port:49780
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044979611872816718 05/12/22-11:46:47.263188
        SID:2816718
        Source Port:49796
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044980011872816766 05/12/22-11:46:58.472336
        SID:2816766
        Source Port:49800
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044980311872816766 05/12/22-11:47:06.947797
        SID:2816766
        Source Port:49803
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044978711872816766 05/12/22-11:46:33.942053
        SID:2816766
        Source Port:49787
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044978511872816766 05/12/22-11:46:28.745560
        SID:2816766
        Source Port:49785
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044979311872816766 05/12/22-11:46:41.057650
        SID:2816766
        Source Port:49793
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044980411872816766 05/12/22-11:47:13.058709
        SID:2816766
        Source Port:49804
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:212.193.30.204192.168.2.61187497982841753 05/12/22-11:46:52.450159
        SID:2841753
        Source Port:1187
        Destination Port:49798
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044977011872816766 05/12/22-11:46:01.257200
        SID:2816766
        Source Port:49770
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:212.193.30.204192.168.2.61187497772841753 05/12/22-11:46:15.045473
        SID:2841753
        Source Port:1187
        Destination Port:49777
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044980611872816766 05/12/22-11:47:22.408127
        SID:2816766
        Source Port:49806
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044977511872816766 05/12/22-11:46:10.024463
        SID:2816766
        Source Port:49775
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044978011872816766 05/12/22-11:46:21.037112
        SID:2816766
        Source Port:49780
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044979611872816766 05/12/22-11:46:47.263188
        SID:2816766
        Source Port:49796
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044984911872816766 05/12/22-11:47:34.356352
        SID:2816766
        Source Port:49849
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:212.193.30.204192.168.2.61187498612841753 05/12/22-11:47:44.554133
        SID:2841753
        Source Port:1187
        Destination Port:49861
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.6212.193.30.2044982011872816766 05/12/22-11:47:28.336048
        SID:2816766
        Source Port:49820
        Destination Port:1187
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "fe56abb4-cb76-44f1-89b4-7bb11730", "Group": "Default", "Domain1": "deranano2.ddns.net", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Source: MARIAM HONAINE'S CV.exeReversingLabs: Detection: 26%
        Source: deranano2.ddns.netAvira URL Cloud: Label: malware
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 7152, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 6348, type: MEMORYSTR
        Source: MARIAM HONAINE'S CV.exeJoe Sandbox ML: detected
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: MARIAM HONAINE'S CV.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: MARIAM HONAINE'S CV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\nEhISHFvXt\src\obj\Debug\RemotingMethodCachedD.pdb source: MARIAM HONAINE'S CV.exe

        Networking

        barindex
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49770 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49775 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 212.193.30.204:1187 -> 192.168.2.6:49777
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49780 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 212.193.30.204:1187 -> 192.168.2.6:49780
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49785 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49787 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49793 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49796 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.6:49796 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 212.193.30.204:1187 -> 192.168.2.6:49798
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49800 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49803 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49804 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49806 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49820 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49849 -> 212.193.30.204:1187
        Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 212.193.30.204:1187 -> 192.168.2.6:49861
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: deranano2.ddns.net
        Source: unknownDNS query: name: deranano2.ddns.net
        Source: Joe Sandbox ViewASN Name: SPD-NETTR SPD-NETTR
        Source: Joe Sandbox ViewIP Address: 212.193.30.204 212.193.30.204
        Source: global trafficTCP traffic: 192.168.2.6:49770 -> 212.193.30.204:1187
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381760903.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381694433.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382892528.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382472389.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381820350.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382033178.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382665325.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382529900.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381982221.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382110091.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381729463.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381571637.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381866734.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382216468.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382764477.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382990731.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386645584.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386814275.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.htmlmR
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.387348343.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387100746.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387290231.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comZ
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.387348343.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387100746.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387290231.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comad
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.387100746.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387068017.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387290231.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comitk%1~
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394992410.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlB
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396163819.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396306523.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com5
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394768628.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com=
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394768628.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comM.TTF
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalic
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395173886.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394992410.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsF
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.401295874.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.400930743.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401215077.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401056107.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comaswa
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393509824.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393079830.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393326901.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393271986.0000000006420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcec
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395173886.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394768628.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395173886.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396562455.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396163819.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396438888.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396368892.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394992410.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396306523.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd#
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdv
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.417058616.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401295874.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.400930743.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.424743336.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401215077.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401056107.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comf
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393509824.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394768628.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393326901.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgritaP
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.417058616.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401295874.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.400930743.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.424743336.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401215077.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401056107.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgritot
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.393271986.0000000006420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comk
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.417058616.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401295874.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.400930743.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.424743336.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401215077.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401056107.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm5
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395173886.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commeta
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.393079830.0000000006420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comt
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.385580928.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385478543.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386390754.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385512809.0000000006424000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.385910395.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/m
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.385910395.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnC
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.386363635.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386199281.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385910395.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386003136.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnMic
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.386363635.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386199281.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385910395.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386003136.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386390754.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnMicF
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.385478543.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385512809.0000000006424000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnht
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.385580928.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnl/
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.397211794.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.397211794.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/L
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.397532612.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.399612277.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385201801.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.k
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kroms-c
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.389084701.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390980287.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390487072.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389227560.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390667270.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390739269.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389552760.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389084701.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/5
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.388929627.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389000562.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.388814454.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389084701.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/8
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.388929627.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389000562.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389227560.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.388814454.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389552760.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389084701.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/C
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390487072.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/P
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390487072.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389227560.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389552760.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390980287.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390487072.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389227560.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389552760.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/oi
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.389000562.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/wa
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.379865607.0000000006402000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.379865607.0000000006402000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comn-u
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.379865607.0000000006402000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comt
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390856956.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390667270.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390739269.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390929434.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comC
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr5
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384784043.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kra-e
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krony
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384784043.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krormalm
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.384784043.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krtp
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.386363635.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.388028941.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387779013.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387524809.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387889386.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387592910.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.388190394.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.388028941.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387779013.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387524809.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387889386.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387592910.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comic
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.387779013.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387524809.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387592910.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comu
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.392242971.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392325968.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392788515.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393079830.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392587814.0000000006420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.392242971.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392325968.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392587814.0000000006420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de$
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deFT
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deMTl
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.392242971.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392325968.0000000006420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deo
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnB
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnln
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnthdt
        Source: unknownDNS traffic detected: queries for: deranano2.ddns.net

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 7152, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 6348, type: MEMORYSTR

        System Summary

        barindex
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
        Source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
        Source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 7152, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 7152, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 6348, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 6348, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: MARIAM HONAINE'S CV.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
        Source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
        Source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 7152, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 7152, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 6348, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 6348, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeCode function: 0_2_0189E660
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeCode function: 0_2_0189C67C
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeCode function: 0_2_0189E670
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeCode function: 0_2_00EB2208
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeCode function: 4_2_004D2208
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.417542103.0000000000F38000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRemotingMethodCachedD.exeF vs MARIAM HONAINE'S CV.exe
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.425760886.0000000007C00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs MARIAM HONAINE'S CV.exe
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs MARIAM HONAINE'S CV.exe
        Source: MARIAM HONAINE'S CV.exe, 00000004.00000000.412138917.0000000000558000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRemotingMethodCachedD.exeF vs MARIAM HONAINE'S CV.exe
        Source: MARIAM HONAINE'S CV.exeBinary or memory string: OriginalFilenameRemotingMethodCachedD.exeF vs MARIAM HONAINE'S CV.exe
        Source: MARIAM HONAINE'S CV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: MARIAM HONAINE'S CV.exeReversingLabs: Detection: 26%
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeFile read: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeJump to behavior
        Source: MARIAM HONAINE'S CV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe "C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe"
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess created: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess created: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MARIAM HONAINE'S CV.exe.logJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@3/5@16/1
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{fe56abb4-cb76-44f1-89b4-7bb11730ab9d}
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: MARIAM HONAINE'S CV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: MARIAM HONAINE'S CV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: MARIAM HONAINE'S CV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\nEhISHFvXt\src\obj\Debug\RemotingMethodCachedD.pdb source: MARIAM HONAINE'S CV.exe
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeCode function: 0_2_00EB9DFA pushad ; ret
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeCode function: 4_2_004D9DFA pushad ; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.91719358368

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeFile opened: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 00000000.00000002.419788610.0000000003478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.419326038.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 7152, type: MEMORYSTR
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.419788610.0000000003478000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.419326038.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.419788610.0000000003478000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.419326038.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe TID: 7156Thread sleep time: -45733s >= -30000s
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe TID: 5860Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe TID: 684Thread sleep time: -13835058055282155s >= -30000s
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWindow / User API: threadDelayed 5632
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWindow / User API: threadDelayed 3253
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWindow / User API: foregroundWindowGot 742
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWindow / User API: foregroundWindowGot 807
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeThread delayed: delay time: 45733
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeThread delayed: delay time: 922337203685477
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.419326038.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.419326038.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.419326038.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.419326038.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeMemory written: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeProcess created: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\MARIAM HONAINE'S CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 7152, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 6348, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: MARIAM HONAINE'S CV.exe, 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MARIAM HONAINE'S CV.exe, 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4679520.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.4628b20.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.MARIAM HONAINE'S CV.exe.45f4300.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 7152, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MARIAM HONAINE'S CV.exe PID: 6348, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Windows Management Instrumentation
        Path Interception111
        Process Injection
        1
        Masquerading
        OS Credential Dumping1
        Query Registry
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Disable or Modify Tools
        LSASS Memory111
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
        Process Injection
        NTDS21
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Hidden Files and Directories
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingData Transfer Size Limits21
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common2
        Obfuscated Files or Information
        Cached Domain Credentials12
        System Information Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items3
        Software Packing
        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        MARIAM HONAINE'S CV.exe27%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
        MARIAM HONAINE'S CV.exe100%Joe Sandbox ML
        No Antivirus matches
        SourceDetectionScannerLabelLinkDownload
        4.0.MARIAM HONAINE'S CV.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.0.MARIAM HONAINE'S CV.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.0.MARIAM HONAINE'S CV.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.0.MARIAM HONAINE'S CV.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.0.MARIAM HONAINE'S CV.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.2.MARIAM HONAINE'S CV.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        SourceDetectionScannerLabelLink
        deranano2.ddns.net4%VirustotalBrowse
        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://www.goodfont.co.kroms-c0%Avira URL Cloudsafe
        http://www.ascendercorp.com/typedesigners.htmlmR0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnB0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.sandoll.co.kr50%Avira URL Cloudsafe
        http://www.fontbureau.comgritaP0%Avira URL Cloudsafe
        http://www.sajatypeworks.comn-u0%URL Reputationsafe
        http://www.urwpp.deMTl0%Avira URL Cloudsafe
        http://www.sandoll.co.krony0%Avira URL Cloudsafe
        http://www.fontbureau.comd#0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.zhongyicts.com.cnln0%Avira URL Cloudsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kra-e0%URL Reputationsafe
        http://www.founder.com.cn/cnl/0%Avira URL Cloudsafe
        http://www.fontbureau.comalsF0%URL Reputationsafe
        http://www.founder.com.cn/cnC0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cnht0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/50%URL Reputationsafe
        http://www.goodfont.co.k0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.urwpp.deFT0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.carterandcone.comad0%Avira URL Cloudsafe
        http://www.fontbureau.com50%Avira URL Cloudsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.sandoll.co.krtp0%Avira URL Cloudsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.urwpp.de$0%Avira URL Cloudsafe
        http://www.fontbureau.com=0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/m0%Avira URL Cloudsafe
        http://www.fontbureau.comdv0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/L0%Avira URL Cloudsafe
        http://www.carterandcone.comitk%1~0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnMic0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.fontbureau.comF0%URL Reputationsafe
        http://www.sajatypeworks.comt0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/wa0%URL Reputationsafe
        http://www.carterandcone.comZ0%URL Reputationsafe
        http://www.tiro.comu0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/P0%URL Reputationsafe
        http://www.founder.com.cn/cnMicF0%Avira URL Cloudsafe
        http://www.fontbureau.commeta0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnthdt0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/C0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/oi0%URL Reputationsafe
        http://www.sakkal.comC0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.comd0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.fontbureau.comgritot0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.fontbureau.comk0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        deranano2.ddns.net100%Avira URL Cloudmalware
        http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
        http://www.fontbureau.comt0%URL Reputationsafe
        http://www.fontbureau.comcec0%Avira URL Cloudsafe
        http://www.sandoll.co.krormalm0%Avira URL Cloudsafe
        http://www.urwpp.deo0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.zhongyicts.com.cno.0%URL Reputationsafe
        http://www.fontbureau.comalic0%URL Reputationsafe
        http://www.fontbureau.comM.TTF0%URL Reputationsafe
        http://www.tiro.comic0%URL Reputationsafe
        http://www.fontbureau.comm50%Avira URL Cloudsafe
        http://www.fontbureau.comaswa0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        deranano2.ddns.net
        212.193.30.204
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        true
        • Avira URL Cloud: safe
        low
        deranano2.ddns.nettrue
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designersGMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.goodfont.co.kroms-cMARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmlmRMARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.zhongyicts.com.cnBMARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designers/?MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.sandoll.co.kr5MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.comgritaPMARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393509824.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394768628.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393326901.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.comn-uMARIAM HONAINE'S CV.exe, 00000000.00000003.379865607.0000000006402000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deMTlMARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sandoll.co.kronyMARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comd#MARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395173886.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396562455.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396163819.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396438888.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396368892.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394992410.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396306523.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.comMARIAM HONAINE'S CV.exe, 00000000.00000003.386363635.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.388028941.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387779013.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387524809.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387889386.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387592910.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnlnMARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designersMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.goodfont.co.krMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sandoll.co.kra-eMARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384784043.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnl/MARIAM HONAINE'S CV.exe, 00000000.00000003.385580928.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.comalsFMARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395173886.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394992410.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnCMARIAM HONAINE'S CV.exe, 00000000.00000003.385910395.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.comMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.379865607.0000000006402000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnhtMARIAM HONAINE'S CV.exe, 00000000.00000003.385478543.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385512809.0000000006424000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.typography.netDMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/cTheMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/staff/dennis.htmMARIAM HONAINE'S CV.exe, 00000000.00000003.397532612.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.399612277.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://fontfabrik.comMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381760903.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381694433.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382892528.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382472389.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381820350.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382033178.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382665325.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382529900.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381982221.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382110091.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381729463.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381571637.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.381866734.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382216468.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382764477.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.382990731.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/8MARIAM HONAINE'S CV.exe, 00000000.00000003.388929627.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389000562.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.388814454.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389084701.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/5MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390487072.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389227560.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390667270.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390739269.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389552760.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389084701.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.goodfont.co.kMARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385201801.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/MARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.galapagosdesign.com/DPleaseMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/Y0MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390487072.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.ascendercorp.com/typedesigners.htmlMARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.urwpp.deFTMARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fonts.comMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.sandoll.co.krMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comadMARIAM HONAINE'S CV.exe, 00000000.00000003.387348343.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387100746.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387290231.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com5MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396163819.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396306523.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.deDPleaseMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sandoll.co.krtpMARIAM HONAINE'S CV.exe, 00000000.00000003.384784043.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.deMARIAM HONAINE'S CV.exe, 00000000.00000003.392242971.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392325968.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392788515.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393079830.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392587814.0000000006420000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sakkal.comMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390856956.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390667270.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390739269.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390929434.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.de$MARIAM HONAINE'S CV.exe, 00000000.00000003.392242971.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392325968.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392587814.0000000006420000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.fontbureau.com=MARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394768628.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.founder.com.cn/cn/mMARIAM HONAINE'S CV.exe, 00000000.00000003.385094539.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comdvMARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.galapagosdesign.com/LMARIAM HONAINE'S CV.exe, 00000000.00000003.397211794.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386645584.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386814275.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.carterandcone.comitk%1~MARIAM HONAINE'S CV.exe, 00000000.00000003.387100746.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387068017.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387290231.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.fontbureau.comMARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cnMicMARIAM HONAINE'S CV.exe, 00000000.00000003.386363635.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386199281.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385910395.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386003136.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/MARIAM HONAINE'S CV.exe, 00000000.00000003.397211794.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comFMARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394768628.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comtMARIAM HONAINE'S CV.exe, 00000000.00000003.379865607.0000000006402000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/waMARIAM HONAINE'S CV.exe, 00000000.00000003.389000562.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comZMARIAM HONAINE'S CV.exe, 00000000.00000003.387348343.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387100746.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387290231.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.tiro.comuMARIAM HONAINE'S CV.exe, 00000000.00000003.387779013.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387524809.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387592910.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/PMARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390487072.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnMicFMARIAM HONAINE'S CV.exe, 00000000.00000003.386363635.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386199281.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385910395.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386003136.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386390754.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.commetaMARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395173886.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.zhongyicts.com.cnthdtMARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/CMARIAM HONAINE'S CV.exe, 00000000.00000003.388929627.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389000562.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389227560.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.388814454.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389552760.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389084701.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/oiMARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390487072.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389227560.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389552760.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sakkal.comCMARIAM HONAINE'S CV.exe, 00000000.00000003.390626823.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/jp/MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390980287.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comdMARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393745876.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395173886.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393845488.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394768628.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394525592.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394013601.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394435117.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comgritotMARIAM HONAINE'S CV.exe, 00000000.00000003.417058616.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401295874.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.400930743.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.424743336.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401215077.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401056107.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cn/MARIAM HONAINE'S CV.exe, 00000000.00000003.385910395.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNMARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comkMARIAM HONAINE'S CV.exe, 00000000.00000003.393271986.0000000006420000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnMARIAM HONAINE'S CV.exe, 00000000.00000003.385580928.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385478543.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.386390754.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.385512809.0000000006424000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlMARIAM HONAINE'S CV.exe, 00000000.00000003.394167182.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394281158.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comfMARIAM HONAINE'S CV.exe, 00000000.00000003.417058616.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401295874.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.400930743.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.424743336.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401215077.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401056107.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://www.jiyu-kobo.co.jp/Y0/MARIAM HONAINE'S CV.exe, 00000000.00000003.390414746.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389227560.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389724931.0000000006421000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390193150.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.389552760.000000000641C000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390000319.0000000006421000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comtMARIAM HONAINE'S CV.exe, 00000000.00000003.393079830.0000000006420000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comcecMARIAM HONAINE'S CV.exe, 00000000.00000003.393683221.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393509824.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393079830.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393326901.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.393271986.0000000006420000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.sandoll.co.krormalmMARIAM HONAINE'S CV.exe, 00000000.00000003.384949696.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.384784043.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.urwpp.deoMARIAM HONAINE'S CV.exe, 00000000.00000003.392242971.0000000006420000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.392325968.0000000006420000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/MARIAM HONAINE'S CV.exe, 00000000.00000003.389084701.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.390980287.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cno.MARIAM HONAINE'S CV.exe, 00000000.00000003.386866659.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8MARIAM HONAINE'S CV.exe, 00000000.00000002.425051990.0000000007612000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designers/cabarga.htmlBMARIAM HONAINE'S CV.exe, 00000000.00000003.395066096.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.394992410.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comalicMARIAM HONAINE'S CV.exe, 00000000.00000003.395837633.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395949348.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395587835.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.396065018.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.395704710.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comM.TTFMARIAM HONAINE'S CV.exe, 00000000.00000003.395400476.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.tiro.comicMARIAM HONAINE'S CV.exe, 00000000.00000003.388190394.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.388028941.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387779013.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387524809.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387889386.000000000641B000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.387592910.000000000641B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comm5MARIAM HONAINE'S CV.exe, 00000000.00000003.417058616.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401295874.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.400930743.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000002.424743336.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401215077.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401056107.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comaswaMARIAM HONAINE'S CV.exe, 00000000.00000003.401295874.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.400930743.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401215077.0000000006423000.00000004.00000800.00020000.00000000.sdmp, MARIAM HONAINE'S CV.exe, 00000000.00000003.401056107.0000000006423000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  212.193.30.204
                                  deranano2.ddns.netRussian Federation
                                  57844SPD-NETTRtrue
                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                  Analysis ID:625073
                                  Start date and time: 12/05/202211:44:202022-05-12 11:44:20 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 10m 45s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:MARIAM HONAINE'S CV.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:21
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@3/5@16/1
                                  EGA Information:
                                  • Successful, ratio: 50%
                                  HDC Information:
                                  • Successful, ratio: 0.1% (good quality ratio 0.1%)
                                  • Quality average: 39.5%
                                  • Quality standard deviation: 39.5%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                  • TCP Packets have been reduced to 100
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.211.4.86
                                  • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                                  • Execution Graph export aborted for target MARIAM HONAINE'S CV.exe, PID 6348 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  TimeTypeDescription
                                  11:45:48API Interceptor846x Sleep call for process: MARIAM HONAINE'S CV.exe modified
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1308
                                  Entropy (8bit):5.345811588615766
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4FsXE8:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHJ
                                  MD5:EA78C102145ED608EF0E407B978AF339
                                  SHA1:66C9179ED9675B9271A97AB1FC878077E09AB731
                                  SHA-256:8BF01E0C445BD07C0B4EDC7199B7E17DAF1CA55CA52D4A6EAC4EF211C2B1A73E
                                  SHA-512:8C04139A1FC3C3BDACB680EC443615A43EB18E73B5A0CFCA644CB4A5E71746B275B3E238DD1A5A205405313E457BB75F9BBB93277C67AFA5D78DCFA30E5DA02B
                                  Malicious:true
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                  Process:C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):232
                                  Entropy (8bit):7.024371743172393
                                  Encrypted:false
                                  SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                  MD5:32D0AAE13696FF7F8AF33B2D22451028
                                  SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                  SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                  SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                  Process:C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
                                  File Type:ISO-8859 text, with no line terminators
                                  Category:dropped
                                  Size (bytes):8
                                  Entropy (8bit):3.0
                                  Encrypted:false
                                  SSDEEP:3:t:t
                                  MD5:3E862D2A00D474869A25EF6DD9304AA4
                                  SHA1:61EA60F35779039D0235025023E7D4B3B9BD13B3
                                  SHA-256:6EABE5037060667B9AD712153E7B9D8DEF2F805986390C7C46DF2ACD6F7E9959
                                  SHA-512:BF3888E89AF9D7DFA9C22F93D8DCB993ED048422DE13EE5431B68B748840975C0365DC437BA0B6B41B2794E25A0ED05A9AA9161F65B5412F32F05C5A474E6D45
                                  Malicious:true
                                  Reputation:low
                                  Preview:*Ix.G4.H
                                  Process:C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):40
                                  Entropy (8bit):5.153055907333276
                                  Encrypted:false
                                  SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                  MD5:4E5E92E2369688041CC82EF9650EDED2
                                  SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                  SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                  SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                                  Process:C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):327432
                                  Entropy (8bit):7.99938831605763
                                  Encrypted:true
                                  SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                  MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                  SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                  SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                  SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.763627203007017
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:MARIAM HONAINE'S CV.exe
                                  File size:573440
                                  MD5:06981ba465eb7eca5e8da7572511e3d1
                                  SHA1:75e5740ef54f5c7b4df89589423ad3fea84dbac2
                                  SHA256:dd810d37c396be1e34d2fe8b76c5ff30c17b6bb64afcc1c682182fb6934a3f60
                                  SHA512:78a0e8efd80677fb4d6626d2fb9f3f9ed93f7bb623c216f4f8ea597a87d09f6ff64893f8c902db2b85f90eec2347d5dfbe9cb128aec1610e563ff6e68c5fd2b6
                                  SSDEEP:12288:EcRhTV0MEfIFgiLcyvXbfxg/P3reRgCkie:EcRliMeu3gyvLf233reR6i
                                  TLSH:BCC4231811A8533BE4AE1BF9DDA281DD27B0EE366D40CB1F8CD175EA46B7B44885270F
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....X|b..............0..`...@.......`... ........@.. ... ....................... ........@................................
                                  Icon Hash:00828e8e8686b000
                                  Entrypoint:0x4860da
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x627C58F8 [Thu May 12 00:46:48 2022 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:v4.0.30319
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x860880x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x604.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x85f500x1c.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x840e00x86000False0.944028028801data7.91719358368IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rsrc0x880000x6040x2000False0.0850830078125data1.10826852804IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x8a0000xc0x2000False0.0050048828125data0.00881485270734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountry
                                  RT_VERSION0x880900x374data
                                  RT_MANIFEST0x884140x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  DescriptionData
                                  Translation0x0000 0x04b0
                                  LegalCopyrightCopyright 2013
                                  Assembly Version0.0.1.0
                                  InternalNameRemotingMethodCachedD.exe
                                  FileVersion0.0.1.0
                                  CompanyName
                                  LegalTrademarks
                                  Comments
                                  ProductNamePagedOptionsDialog
                                  ProductVersion0.0.1.0
                                  FileDescriptionPagedOptionsDialog
                                  OriginalFilenameRemotingMethodCachedD.exe
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  212.193.30.204192.168.2.61187497802810290 05/12/22-11:46:21.496806TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1118749780212.193.30.204192.168.2.6
                                  192.168.2.6212.193.30.2044979611872816718 05/12/22-11:46:47.263188TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497961187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044980011872816766 05/12/22-11:46:58.472336TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498001187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044980311872816766 05/12/22-11:47:06.947797TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498031187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044978711872816766 05/12/22-11:46:33.942053TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497871187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044978511872816766 05/12/22-11:46:28.745560TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497851187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044979311872816766 05/12/22-11:46:41.057650TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497931187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044980411872816766 05/12/22-11:47:13.058709TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498041187192.168.2.6212.193.30.204
                                  212.193.30.204192.168.2.61187497982841753 05/12/22-11:46:52.450159TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)118749798212.193.30.204192.168.2.6
                                  192.168.2.6212.193.30.2044977011872816766 05/12/22-11:46:01.257200TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497701187192.168.2.6212.193.30.204
                                  212.193.30.204192.168.2.61187497772841753 05/12/22-11:46:15.045473TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)118749777212.193.30.204192.168.2.6
                                  192.168.2.6212.193.30.2044980611872816766 05/12/22-11:47:22.408127TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498061187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044977511872816766 05/12/22-11:46:10.024463TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497751187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044978011872816766 05/12/22-11:46:21.037112TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497801187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044979611872816766 05/12/22-11:46:47.263188TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497961187192.168.2.6212.193.30.204
                                  192.168.2.6212.193.30.2044984911872816766 05/12/22-11:47:34.356352TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498491187192.168.2.6212.193.30.204
                                  212.193.30.204192.168.2.61187498612841753 05/12/22-11:47:44.554133TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)118749861212.193.30.204192.168.2.6
                                  192.168.2.6212.193.30.2044982011872816766 05/12/22-11:47:28.336048TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498201187192.168.2.6212.193.30.204
                                  TimestampSource PortDest PortSource IPDest IP
                                  May 12, 2022 11:45:59.768074036 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:45:59.798646927 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:45:59.798880100 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:45:59.902026892 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:45:59.962167978 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.085453987 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.121727943 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.150132895 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.244966984 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.330940962 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.428030968 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.518336058 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.554204941 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.554248095 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.554275036 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.554300070 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.554425001 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.588407040 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.588443995 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.588468075 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.588520050 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.588542938 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.588563919 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.588573933 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.588587046 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.588608980 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.588609934 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.588614941 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.590961933 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.616678953 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616727114 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616754055 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616781950 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616811991 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616811991 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.616839886 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616851091 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.616871119 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616902113 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616928101 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616940022 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.616956949 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.616960049 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.616985083 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.617003918 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.617013931 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.618964911 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.622205019 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.622251034 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.622344017 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.622381926 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.622409105 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.622450113 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.645078897 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645124912 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645157099 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645190001 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645225048 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645229101 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.645262957 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645287037 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.645299911 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645334005 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645366907 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645401955 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645406961 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.645436049 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645471096 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645478010 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.645505905 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645539045 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.645556927 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645601034 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645651102 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645679951 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.645695925 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645723104 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.645744085 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645792007 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645826101 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.645829916 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.645889997 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.653934002 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.653995037 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654032946 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654072046 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654071093 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.654117107 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654149055 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.654158115 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654198885 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654249907 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654256105 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.654290915 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654298067 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.654329062 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654372931 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654424906 CEST497701187192.168.2.6212.193.30.204
                                  May 12, 2022 11:46:00.654426098 CEST118749770212.193.30.204192.168.2.6
                                  May 12, 2022 11:46:00.654476881 CEST497701187192.168.2.6212.193.30.204
                                  TimestampSource PortDest PortSource IPDest IP
                                  May 12, 2022 11:45:59.719104052 CEST6035053192.168.2.68.8.8.8
                                  May 12, 2022 11:45:59.738647938 CEST53603508.8.8.8192.168.2.6
                                  May 12, 2022 11:46:07.848177910 CEST5095853192.168.2.68.8.8.8
                                  May 12, 2022 11:46:07.865642071 CEST53509588.8.8.8192.168.2.6
                                  May 12, 2022 11:46:14.942732096 CEST6160753192.168.2.68.8.8.8
                                  May 12, 2022 11:46:14.964139938 CEST53616078.8.8.8192.168.2.6
                                  May 12, 2022 11:46:20.013334990 CEST5002953192.168.2.68.8.8.8
                                  May 12, 2022 11:46:20.034503937 CEST53500298.8.8.8192.168.2.6
                                  May 12, 2022 11:46:27.248006105 CEST5703753192.168.2.68.8.8.8
                                  May 12, 2022 11:46:27.276652098 CEST53570378.8.8.8192.168.2.6
                                  May 12, 2022 11:46:33.789479971 CEST5452953192.168.2.68.8.8.8
                                  May 12, 2022 11:46:33.809222937 CEST53545298.8.8.8192.168.2.6
                                  May 12, 2022 11:46:40.117198944 CEST5401553192.168.2.68.8.8.8
                                  May 12, 2022 11:46:40.138298988 CEST53540158.8.8.8192.168.2.6
                                  May 12, 2022 11:46:46.328948975 CEST5269853192.168.2.68.8.8.8
                                  May 12, 2022 11:46:46.346694946 CEST53526988.8.8.8192.168.2.6
                                  May 12, 2022 11:46:52.333759069 CEST5382953192.168.2.68.8.8.8
                                  May 12, 2022 11:46:52.353224993 CEST53538298.8.8.8192.168.2.6
                                  May 12, 2022 11:46:57.576210976 CEST5868953192.168.2.68.8.8.8
                                  May 12, 2022 11:46:57.595288992 CEST53586898.8.8.8192.168.2.6
                                  May 12, 2022 11:47:05.205492020 CEST4952053192.168.2.68.8.8.8
                                  May 12, 2022 11:47:05.226891041 CEST53495208.8.8.8192.168.2.6
                                  May 12, 2022 11:47:11.999896049 CEST6552653192.168.2.68.8.8.8
                                  May 12, 2022 11:47:12.017131090 CEST53655268.8.8.8192.168.2.6
                                  May 12, 2022 11:47:20.426290035 CEST5296553192.168.2.68.8.8.8
                                  May 12, 2022 11:47:20.446069956 CEST53529658.8.8.8192.168.2.6
                                  May 12, 2022 11:47:27.310189009 CEST6023853192.168.2.68.8.8.8
                                  May 12, 2022 11:47:27.331798077 CEST53602388.8.8.8192.168.2.6
                                  May 12, 2022 11:47:33.475518942 CEST5902853192.168.2.68.8.8.8
                                  May 12, 2022 11:47:33.494777918 CEST53590288.8.8.8192.168.2.6
                                  May 12, 2022 11:47:39.463468075 CEST5717853192.168.2.68.8.8.8
                                  May 12, 2022 11:47:39.482785940 CEST53571788.8.8.8192.168.2.6
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  May 12, 2022 11:45:59.719104052 CEST192.168.2.68.8.8.80xb72Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:46:07.848177910 CEST192.168.2.68.8.8.80x8438Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:46:14.942732096 CEST192.168.2.68.8.8.80x20eaStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:46:20.013334990 CEST192.168.2.68.8.8.80x127eStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:46:27.248006105 CEST192.168.2.68.8.8.80x2df3Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:46:33.789479971 CEST192.168.2.68.8.8.80xe7d2Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:46:40.117198944 CEST192.168.2.68.8.8.80x6489Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:46:46.328948975 CEST192.168.2.68.8.8.80x7d06Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:46:52.333759069 CEST192.168.2.68.8.8.80x8b08Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:46:57.576210976 CEST192.168.2.68.8.8.80x49b1Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:47:05.205492020 CEST192.168.2.68.8.8.80x939aStandard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:47:11.999896049 CEST192.168.2.68.8.8.80x1316Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:47:20.426290035 CEST192.168.2.68.8.8.80xb5e1Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:47:27.310189009 CEST192.168.2.68.8.8.80x36f7Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:47:33.475518942 CEST192.168.2.68.8.8.80x5d04Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  May 12, 2022 11:47:39.463468075 CEST192.168.2.68.8.8.80xaf92Standard query (0)deranano2.ddns.netA (IP address)IN (0x0001)
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  May 12, 2022 11:45:59.738647938 CEST8.8.8.8192.168.2.60xb72No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:46:07.865642071 CEST8.8.8.8192.168.2.60x8438No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:46:14.964139938 CEST8.8.8.8192.168.2.60x20eaNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:46:20.034503937 CEST8.8.8.8192.168.2.60x127eNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:46:27.276652098 CEST8.8.8.8192.168.2.60x2df3No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:46:33.809222937 CEST8.8.8.8192.168.2.60xe7d2No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:46:40.138298988 CEST8.8.8.8192.168.2.60x6489No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:46:46.346694946 CEST8.8.8.8192.168.2.60x7d06No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:46:52.353224993 CEST8.8.8.8192.168.2.60x8b08No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:46:57.595288992 CEST8.8.8.8192.168.2.60x49b1No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:47:05.226891041 CEST8.8.8.8192.168.2.60x939aNo error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:47:12.017131090 CEST8.8.8.8192.168.2.60x1316No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:47:20.446069956 CEST8.8.8.8192.168.2.60xb5e1No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:47:27.331798077 CEST8.8.8.8192.168.2.60x36f7No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:47:33.494777918 CEST8.8.8.8192.168.2.60x5d04No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)
                                  May 12, 2022 11:47:39.482785940 CEST8.8.8.8192.168.2.60xaf92No error (0)deranano2.ddns.net212.193.30.204A (IP address)IN (0x0001)

                                  Click to jump to process

                                  Target ID:0
                                  Start time:11:45:35
                                  Start date:12/05/2022
                                  Path:C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe"
                                  Imagebase:0xeb0000
                                  File size:573440 bytes
                                  MD5 hash:06981BA465EB7ECA5E8DA7572511E3D1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.419788610.0000000003478000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.419326038.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.422868200.000000000454E000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  Target ID:4
                                  Start time:11:45:51
                                  Start date:12/05/2022
                                  Path:C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\MARIAM HONAINE'S CV.exe
                                  Imagebase:0x4d0000
                                  File size:573440 bytes
                                  MD5 hash:06981BA465EB7ECA5E8DA7572511E3D1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.415374515.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.414610798.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.642621063.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.413975358.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.413448307.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low

                                  No disassembly