Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe

Overview

General Information

Sample Name:HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
Analysis ID:881357
MD5:81b7988b523fb109b834c76e7f0fea10
SHA1:9d14022defd1373971a2892b1a5b5bbe830280ce
SHA256:1617174ffdba50f5efa07c53e0ffb0d765f35cbe821173bda7cd96c1f5cfe5cd
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
.NET source code contains very large strings
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe (PID: 7144 cmdline: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe MD5: 81B7988B523FB109B834C76E7F0FEA10)
    • schtasks.exe (PID: 6060 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jAqpXXDLkkJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA2.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "8016d6d7-9a9c-4266-8244-58d40eab", "Group": "Mba-Month", "Domain1": "podzeye.duckdns.org", "Domain2": "", "Port": 414, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x10a5d:$x1: NanoCore.ClientPluginHost
  • 0x10a9a:$x2: IClientNetworkHost
  • 0x145cd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x107c5:$a: NanoCore
    • 0x107d5:$a: NanoCore
    • 0x10a09:$a: NanoCore
    • 0x10a1d:$a: NanoCore
    • 0x10a5d:$a: NanoCore
    • 0x10824:$b: ClientPlugin
    • 0x10a26:$b: ClientPlugin
    • 0x10a66:$b: ClientPlugin
    • 0x1094b:$c: ProjectData
    • 0x11352:$d: DESCrypto
    • 0x18d1e:$e: KeepAlive
    • 0x16d0c:$g: LogClientMessage
    • 0x12f07:$i: get_Connected
    • 0x11688:$j: #=q
    • 0x116b8:$j: #=q
    • 0x116d4:$j: #=q
    • 0x11704:$j: #=q
    • 0x11720:$j: #=q
    • 0x1173c:$j: #=q
    • 0x1176c:$j: #=q
    • 0x11788:$j: #=q
    00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x10a5d:$a1: NanoCore.ClientPluginHost
    • 0x10a1d:$a2: NanoCore.ClientPlugin
    • 0x12976:$b1: get_BuilderSettings
    • 0x10879:$b2: ClientLoaderForm.resources
    • 0x12096:$b3: PluginCommand
    • 0x10a4e:$b4: IClientAppHost
    • 0x1aece:$b5: GetBlockHash
    • 0x12fce:$b6: AddHostEntry
    • 0x16cc1:$b7: LogClientException
    • 0x12f3b:$b8: PipeExists
    • 0x10a87:$b9: IClientLoggingHost
    00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Click to see the 30 entries
      SourceRuleDescriptionAuthorStrings
      3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xe38:$x2: NanoCore.ClientPlugin
      • 0xe75:$x3: NanoCore.ClientPluginHost
      • 0xe5a:$i1: IClientApp
      • 0xe4e:$i2: IClientData
      • 0xe29:$i3: IClientNetwork
      • 0xec3:$i4: IClientAppHost
      • 0xe65:$i5: IClientDataHost
      • 0xeb0:$i6: IClientLoggingHost
      • 0xe8f:$i7: IClientNetworkHost
      • 0xea2:$i8: IClientUIHost
      • 0xed2:$i9: IClientNameObjectCollection
      • 0xef7:$i10: IClientReadOnlyNameObjectCollection
      • 0xe41:$s1: ClientPlugin
      • 0x177c:$s1: ClientPlugin
      • 0x1789:$s1: ClientPlugin
      • 0x11f9:$s6: get_ClientSettings
      • 0x1249:$s7: get_Connected
      3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xe75:$a1: NanoCore.ClientPluginHost
      • 0xe38:$a2: NanoCore.ClientPlugin
      • 0x120c:$b1: get_BuilderSettings
      • 0xec3:$b4: IClientAppHost
      • 0x127d:$b6: AddHostEntry
      • 0x12ec:$b7: LogClientException
      • 0x1261:$b8: PipeExists
      • 0xeb0:$b9: IClientLoggingHost
      3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      Click to see the 57 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, ProcessId: 5756, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, ProcessId: 5756, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Persistence and Installation Behavior

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jAqpXXDLkkJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA2.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jAqpXXDLkkJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA2.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, ParentImage: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, ParentProcessId: 7144, ParentProcessName: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jAqpXXDLkkJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA2.tmp, ProcessId: 6060, ProcessName: schtasks.exe

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, ProcessId: 5756, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, ProcessId: 5756, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Timestamp:192.168.2.3192.169.69.26497084142816766 06/04/23-04:43:12.068942
      SID:2816766
      Source Port:49708
      Destination Port:414
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "8016d6d7-9a9c-4266-8244-58d40eab", "Group": "Mba-Month", "Domain1": "podzeye.duckdns.org", "Domain2": "", "Port": 414, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeReversingLabs: Detection: 67%
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeVirustotal: Detection: 64%Perma Link
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeAvira: detected
      Source: podzeye.duckdns.orgAvira URL Cloud: Label: malware
      Source: podzeye.duckdns.orgVirustotal: Detection: 15%Perma Link
      Source: podzeye.duckdns.orgVirustotal: Detection: 15%Perma Link
      Source: C:\Users\user\AppData\Roaming\jAqpXXDLkkJ.exeAvira: detection malicious, Label: HEUR/AGEN.1306098
      Source: C:\Users\user\AppData\Roaming\jAqpXXDLkkJ.exeReversingLabs: Detection: 67%
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTR
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\jAqpXXDLkkJ.exeJoe Sandbox ML: detected
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Networking

      barindex
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49708 -> 192.169.69.26:414
      Source: Malware configuration extractorURLs:
      Source: Malware configuration extractorURLs: podzeye.duckdns.org
      Source: unknownDNS query: name: podzeye.duckdns.org
      Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
      Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
      Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365534017.00000000055D6000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365581213.00000000055D6000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365600611.00000000055D6000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365617649.00000000055D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.374035218.00000000055A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.367096675.00000000055A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comR.TTF
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.374035218.00000000055A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.374035218.00000000055A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coml1
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.374035218.00000000055A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comldno
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.367096675.00000000055A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comz
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.368418627.00000000055D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.368418627.00000000055D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/=
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.363939571.00000000055BB000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.363954268.00000000055BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.366069273.00000000055E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comrmJ
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365340286.00000000055A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.t.
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365340286.00000000055A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365340286.00000000055A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comd
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: unknownDNS traffic detected: queries for: podzeye.duckdns.org
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_04EF27E6 WSARecv,
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.374291589.000000000098B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTR

      System Summary

      barindex
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.2c516b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.2c516b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.2c516b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000003.00000002.631138634.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, ConsoleGame/Form1.csLong String: Length: 50988
      Source: jAqpXXDLkkJ.exe.0.dr, ConsoleGame/Form1.csLong String: Length: 50988
      Source: 0.0.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.2a0000.0.unpack, ConsoleGame/Form1.csLong String: Length: 50988
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.50f0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.2c516b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.2c516b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.2c516b0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.2c516b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000003.00000002.631138634.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BB630
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B5A28
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BE810
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BE410
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B7200
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B3A98
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BBA90
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B4748
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B6343
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BDF30
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B3FE8
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B43A0
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BF679
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BAE28
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BB620
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BE01B
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BA810
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BE400
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BE800
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B3CF8
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B70FF
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BAEEA
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B3CE9
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BC8E8
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BC8E3
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B7EE0
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B7ED0
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B92C0
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B70C5
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B92B3
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B70AB
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B94A8
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B9090
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B9080
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BBA80
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BAF44
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BBD20
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BAF24
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B71FB
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B3FD9
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B8BB8
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BC398
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B4391
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027BC387
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_0B340070
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_0B341334
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_0B341336
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_0B340006
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_0B340275
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B0200
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_027B01F1
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026EAB08
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E2FA8
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E23A0
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E9068
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E8468
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E306F
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E912F
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_04CD1E22 NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_04CD1DE8 NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_04EF2D32 NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_04EF2CF7 NtQuerySystemInformation,
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.376251483.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000000.362311264.00000000002A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameConcurrentExclusiveTaskSchedul.exe8 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.374291589.000000000098B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.379846502.0000000006E00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.377846912.0000000005360000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.374291589.0000000000A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameConcurrentExclusiveTaskSchedul.exe8 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.629776621.0000000000C4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.631138634.0000000002C41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.640558600.0000000005520000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeBinary or memory string: OriginalFilenameConcurrentExclusiveTaskSchedul.exe8 vs HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: jAqpXXDLkkJ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeReversingLabs: Detection: 67%
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeVirustotal: Detection: 64%
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFile read: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeJump to behavior
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jAqpXXDLkkJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA2.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess created: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jAqpXXDLkkJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA2.tmp
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess created: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_04CD1D52 AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_04CD1D1B AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_04EF2AF2 AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_04EF2ABB AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFile created: C:\Users\user\AppData\Roaming\jAqpXXDLkkJ.exeJump to behavior
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBEA2.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@22/1
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{8016d6d7-9a9c-4266-8244-58d40eab2ad4}
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeMutant created: \Sessions\1\BaseNamedObjects\uGXYZONQwieVEVRcAq
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6088:120:WilError_01
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, ConsoleGame/Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: jAqpXXDLkkJ.exe.0.dr, ConsoleGame/Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 0.0.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.2a0000.0.unpack, ConsoleGame/Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_00C333C8 pushfd ; retf 006Bh
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_00C324E0 push 9C6BCA71h; ret
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_00C47B96 pushfd ; retf
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 0_2_00C47B6C pushad ; retf
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E3A60 push ecx; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E4369 push esi; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E4339 push ebp; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E58F1 pushad ; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E40D1 push esp; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E5898 pushad ; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E0170 pushad ; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E5971 pushad ; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E3D40 push esp; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E4127 push esp; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E5918 pushad ; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E4511 push edi; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E45B9 push edi; retn 0000h
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_026E4180 push ebp; retn 0000h
      Source: initial sampleStatic PE information: section name: .text entropy: 7.526269053088037
      Source: initial sampleStatic PE information: section name: .text entropy: 7.526269053088037
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFile created: C:\Users\user\AppData\Roaming\jAqpXXDLkkJ.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jAqpXXDLkkJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA2.tmp

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFile opened: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTR
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFunction Chain: threadResumed,threadDelayed,memAlloc,processSet,sectionLoaded,processSet,threadCreated,threadResumed,threadDelayed,windowCreated,memAlloc,threadDelayed,memAlloc,threadInformationSet,threadInformationSet,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeFunction Chain: processSet,threadCreated,threadResumed,threadDelayed,windowCreated,memAlloc,threadDelayed,memAlloc,threadInformationSet,threadInformationSet,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe TID: 7124Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe TID: 7124Thread sleep time: -240000s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe TID: 7124Thread sleep time: -870000s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe TID: 7140Thread sleep time: -42654s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe TID: 7140Thread sleep time: -50000s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe TID: 7124Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe TID: 7132Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe TID: 5952Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe TID: 7068Thread sleep time: -36000s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 240000
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeWindow / User API: foregroundWindowGot 934
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_04EF112A GetSystemInfo,
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 240000
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 30000
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 42654
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 50000
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 30000
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeThread delayed: delay time: 922337203685477
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.629776621.0000000000C72000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.374291589.0000000000A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.629776621.0000000000C72000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeMemory written: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jAqpXXDLkkJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA2.tmp
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeProcess created: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.631138634.0000000002EC3000.00000004.00000800.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.631138634.0000000002D02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.631138634.0000000002D04000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.442930157.0000000000CFB000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.433791763.0000000000CFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager.
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.508359792.0000000000D00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerK
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.630485256.0000000000CFC000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.623867867.0000000000CF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerx-
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.600589161.0000000000CFC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerPa
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.485213385.0000000000D38000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.442335103.0000000000D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managert$
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.501807414.0000000000D00000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.508359792.0000000000D00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager@
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.631138634.0000000002D7A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.501807414.0000000000D00000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000003.508359792.0000000000D00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager \
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.631138634.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.631138634.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5504629.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c92a5d.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.5500000.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c8e434.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.9de8eb8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe.3c895fe.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 7144, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe PID: 5756, type: MEMORYSTR
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_04EF232A bind,
      Source: C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exeCode function: 3_2_04EF22D8 bind,
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      1
      Access Token Manipulation
      1
      Masquerading
      21
      Input Capture
      21
      Security Software Discovery
      Remote Services21
      Input Capture
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default Accounts1
      Native API
      Boot or Logon Initialization Scripts112
      Process Injection
      11
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      Exfiltration Over Bluetooth1
      Remote Access Software
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)1
      Scheduled Task/Job
      21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Ingress Tool Transfer
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
      Access Token Manipulation
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script112
      Process Injection
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingData Transfer Size Limits21
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Deobfuscate/Decode Files or Information
      Cached Domain Credentials13
      System Information Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
      Hidden Files and Directories
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
      Obfuscated Files or Information
      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)12
      Software Packing
      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe68%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe65%VirustotalBrowse
      HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe100%AviraHEUR/AGEN.1306098
      HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\jAqpXXDLkkJ.exe100%AviraHEUR/AGEN.1306098
      C:\Users\user\AppData\Roaming\jAqpXXDLkkJ.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\jAqpXXDLkkJ.exe68%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      No Antivirus matches
      SourceDetectionScannerLabelLink
      podzeye.duckdns.org16%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.fontbureau.coma0%URL Reputationsafe
      http://en.w0%URL Reputationsafe
      http://www.fontbureau.coml10%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.fontbureau.comz0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.fontbureau.comR.TTF0%URL Reputationsafe
      http://www.tiro.comd0%URL Reputationsafe
      0%Avira URL Cloudsafe
      http://www.sakkal.comrmJ0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/=0%VirustotalBrowse
      podzeye.duckdns.org16%VirustotalBrowse
      http://www.t.0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/=0%Avira URL Cloudsafe
      podzeye.duckdns.org100%Avira URL Cloudmalware
      http://www.fontbureau.comldno0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      podzeye.duckdns.org
      192.169.69.26
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      true
      • Avira URL Cloud: safe
      low
      podzeye.duckdns.orgtrue
      • 16%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.apache.org/licenses/LICENSE-2.0HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.comHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.374035218.00000000055A0000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.com/designersGHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.galapagosdesign.com/HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.368418627.00000000055D6000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/?HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.founder.com.cn/cn/bTheHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.galapagosdesign.com/=HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.368418627.00000000055D6000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.comHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365340286.00000000055A2000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.goodfont.co.krHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comaHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.374035218.00000000055A0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://en.wHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365534017.00000000055D6000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365581213.00000000055D6000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365600611.00000000055D6000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365617649.00000000055D6000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.coml1HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.374035218.00000000055A0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comlHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.363939571.00000000055BB000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.363954268.00000000055BB000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.htmlNHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/cTheHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-jones.htmlHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.sakkal.comrmJHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.366069273.00000000055E1000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.t.HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365340286.00000000055A2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comzHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.367096675.00000000055A6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/DPleaseHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers8HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fonts.comHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleaseHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.comHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000002.378015829.0000000006782000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comldnoHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.374035218.00000000055A0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comR.TTFHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.367096675.00000000055A6000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.tiro.comdHEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe, 00000000.00000003.365340286.00000000055A2000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          192.169.69.26
                          podzeye.duckdns.orgUnited States
                          23033WOWUStrue
                          Joe Sandbox Version:37.1.0 Beryl
                          Analysis ID:881357
                          Start date and time:2023-06-04 04:41:06 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 8m 22s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample file name:HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@6/5@22/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe
                          • TCP Packets have been reduced to 100
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtDeviceIoControlFile calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          04:42:02API Interceptor856x Sleep call for process: HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:modified
                          Size (bytes):895
                          Entropy (8bit):5.267807484859312
                          Encrypted:false
                          SSDEEP:24:MLF20NaL329hJ5g522rW2a2+g2s26K95rKoOz2T:MwLLG9h3go2rx9+g2X6oG2T
                          MD5:B3E077F49443B4E3033A37748D818FC6
                          SHA1:6C06565EF8ABD974E8D34BFDBC8981CFC67562E4
                          SHA-256:D1118A0BBCF7AF4819F9678314431A418D3B77767312FA6436A6564EB0F9FF83
                          SHA-512:2E55D43B305984CE230BE4E00220CC51FFB358592D9D010A77174A4E27E18D7D9F32A826D3E780AAA423A380999E50F84E6C43328162F8B2917CE00E1EFBD338
                          Malicious:true
                          Reputation:low
                          Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data\27ab8d047396db374abb803b446b76f0\System.Data.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\de460308a9099237864d2ec2328fc958\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                          Process:C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1644
                          Entropy (8bit):5.205337193730257
                          Encrypted:false
                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBHs2tn:cbh47TlNQ//rydbz9I3YODOLNdq3aA
                          MD5:E505E84B7674DD82695781E85F907F55
                          SHA1:004AAAE57BA1FF6213D3A279CCC95446EDA68849
                          SHA-256:173CD7A8C1F06287BA9251A4201C98D3F02886BF785B4AC0726421EA6475CB14
                          SHA-512:46D364899919CC21EF4AD6B82A67762EB87A071381A3E4639B679B46E3FACA073C73B8A8BDBD8A4505F13AA6C734EF7CF4F472D44FF3777CEF07B761EC13D1EA
                          Malicious:true
                          Reputation:low
                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                          Process:C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          File Type:ISO-8859 text, with no line terminators
                          Category:dropped
                          Size (bytes):8
                          Entropy (8bit):3.0
                          Encrypted:false
                          SSDEEP:3:DSn:DSn
                          MD5:6168249EA05B80227B36364801A82F6E
                          SHA1:87AB76476E06A4A980558870F8DABEA3D81FE1EE
                          SHA-256:FA1CB67CC9EFFA397D609F4F7B758E5FCFD80E545D979018AD9F4F6EE7314AB4
                          SHA-512:2EDCC0B25F7C8D848965D35D89C707CC9AC1C0A4DE6D6B53764DCD73EDEC090E2349993D25398D2E347F2A89169A7F7FFD9D721CA15D48AAF6F09369DB4186AF
                          Malicious:true
                          Reputation:low
                          Preview:C.:..d.H
                          Process:C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):546816
                          Entropy (8bit):7.516638880644476
                          Encrypted:false
                          SSDEEP:12288:FKk4DbF53e0IUFLuEEfrrmdQ5S/eMGXZLfJOSq7Ls9:F0SEwrmW5PMGVJOSCL
                          MD5:81B7988B523FB109B834C76E7F0FEA10
                          SHA1:9D14022DEFD1373971A2892B1A5B5BBE830280CE
                          SHA-256:1617174FFDBA50F5EFA07C53E0FFB0D765F35CBE821173BDA7CD96C1F5CFE5CD
                          SHA-512:17E6BA0DBCA1CFD06D684F6A512CD6C45CA4ED161289FC14D5C5AC4244E33A55657DF85AC249EEDD2031E7DCF29FE4C5478D28EA7A4CF8D621530E1EB6331ADF
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 68%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....?a..............0..@...........^... ...`....@.. ....................................@..................................]..O....`............................................................................... ............... ..H............text... >... ...@.................. ..`.rsrc........`.......B..............@..@.reloc...............V..............@..B.................]......H........d..........2...hH..X............................................0..P........(...........s....}......++...+...{......s....(.......X........-....X........-.*.0............{.....+..*&...}....*...0..............0...2....0.....+....,......r...p..(.......(......(....o.........,......r?..p..(......+D...o.....+...(.......(......(.....o........(....-...........o.......*......d.+........0.."........~3........9.......~4.....o.......+.....+......X............-....X..........-..-
                          Process:C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Reputation:high, very likely benign file
                          Preview:[ZoneTransfer]....ZoneId=0
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.516638880644476
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                          • Win32 Executable (generic) a (10002005/4) 49.75%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Windows Screen Saver (13104/52) 0.07%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          File size:546816
                          MD5:81b7988b523fb109b834c76e7f0fea10
                          SHA1:9d14022defd1373971a2892b1a5b5bbe830280ce
                          SHA256:1617174ffdba50f5efa07c53e0ffb0d765f35cbe821173bda7cd96c1f5cfe5cd
                          SHA512:17e6ba0dbca1cfd06d684f6a512cd6c45ca4ed161289fc14d5c5ac4244e33a55657df85ac249eedd2031e7dcf29fe4c5478d28ea7a4cf8d621530e1eb6331adf
                          SSDEEP:12288:FKk4DbF53e0IUFLuEEfrrmdQ5S/eMGXZLfJOSq7Ls9:F0SEwrmW5PMGVJOSCL
                          TLSH:42C4BE203DFB5119F1B3BFB65EE075868A6FF6332A17E45D104503864B23A81DE91A3B
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....?a..............0..@...........^... ...`....@.. ....................................@................................
                          Icon Hash:8e65656565a5a581
                          Entrypoint:0x485e12
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x613FEAC3 [Tue Sep 14 00:20:19 2021 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          sub byte ptr [eax], al
                          sub al, 00h
                          sub dword ptr [eax], eax
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x85dc00x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x13b8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x83e200x84000False0.8557406338778409data7.526269053088037IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0x860000x13b80x1400False0.549609375data6.174184576615129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x880000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_ICON0x861300xd0cDevice independent bitmap graphic, 32 x 50 x 32, image size 3200
                          RT_GROUP_ICON0x86e3c0x14data
                          RT_VERSION0x86e500x37cdata
                          RT_MANIFEST0x871cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          192.168.2.3192.169.69.26497084142816766 06/04/23-04:43:12.068942TCP2816766ETPRO TROJAN NanoCore RAT CnC 749708414192.168.2.3192.169.69.26
                          TimestampSource PortDest PortSource IPDest IP
                          Jun 4, 2023 04:42:08.593722105 CEST49696414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:09.072313070 CEST41449696192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:09.073271036 CEST49696414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:09.246226072 CEST49696414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:09.575026035 CEST41449696192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:13.826567888 CEST49697414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:14.075243950 CEST41449697192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:14.075371981 CEST49697414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:14.076153040 CEST49697414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:14.581448078 CEST41449697192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:19.022104025 CEST49698414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:19.563606977 CEST41449698192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:19.563736916 CEST49698414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:19.579202890 CEST49698414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:20.068938017 CEST41449698192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:24.265559912 CEST49699414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:24.578030109 CEST41449699192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:24.578366041 CEST49699414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:24.579011917 CEST49699414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:25.069581985 CEST41449699192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:29.295825958 CEST49700414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:29.573273897 CEST41449700192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:29.573376894 CEST49700414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:29.573837042 CEST49700414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:30.069685936 CEST41449700192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:34.268313885 CEST49701414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:34.573151112 CEST41449701192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:34.573282957 CEST49701414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:34.573657036 CEST49701414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:35.068526030 CEST41449701192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:39.284648895 CEST49702414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:39.576230049 CEST41449702192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:39.578665018 CEST49702414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:39.579507113 CEST49702414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:40.069488049 CEST41449702192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:44.197591066 CEST49703414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:44.578819990 CEST41449703192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:44.579087019 CEST49703414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:44.579682112 CEST49703414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:45.071170092 CEST41449703192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:49.353243113 CEST49704414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:49.573173046 CEST41449704192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:49.573282957 CEST49704414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:49.605051994 CEST49704414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:50.070497990 CEST41449704192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:54.453860998 CEST49705414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:55.065051079 CEST41449705192.169.69.26192.168.2.3
                          Jun 4, 2023 04:42:55.065272093 CEST49705414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:55.118761063 CEST49705414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:42:55.573617935 CEST41449705192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:00.431969881 CEST49706414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:01.064155102 CEST41449706192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:01.064308882 CEST49706414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:01.065073013 CEST49706414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:01.568650961 CEST41449706192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:06.146394968 CEST49707414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:06.574738979 CEST41449707192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:06.574925900 CEST49707414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:06.575464010 CEST49707414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:07.072035074 CEST41449707192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:11.383093119 CEST49708414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:11.571010113 CEST41449708192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:11.571146965 CEST49708414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:11.588933945 CEST49708414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:12.068942070 CEST49708414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:12.070327044 CEST41449708192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:12.571326971 CEST41449708192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:16.366458893 CEST49709414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:16.574939966 CEST41449709192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:16.575073957 CEST49709414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:16.577032089 CEST49709414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:17.070564985 CEST41449709192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:21.192884922 CEST49710414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:21.573195934 CEST41449710192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:21.573338032 CEST49710414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:21.603037119 CEST49710414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:22.070581913 CEST41449710192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:26.181845903 CEST49711414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:26.572562933 CEST41449711192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:26.574724913 CEST49711414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:26.576728106 CEST49711414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:27.069644928 CEST41449711192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:34.509677887 CEST49712414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:35.065113068 CEST41449712192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:35.065305948 CEST49712414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:35.065699100 CEST49712414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:35.570178032 CEST41449712192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:40.214036942 CEST49713414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:40.576226950 CEST41449713192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:40.576329947 CEST49713414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:40.582603931 CEST49713414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:41.069681883 CEST41449713192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:45.923980951 CEST49714414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:46.568640947 CEST41449714192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:46.569830894 CEST49714414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:46.593607903 CEST49714414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:47.075848103 CEST41449714192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:51.273710012 CEST49715414192.168.2.3192.169.69.26
                          Jun 4, 2023 04:43:51.575884104 CEST41449715192.169.69.26192.168.2.3
                          Jun 4, 2023 04:43:51.576004982 CEST49715414192.168.2.3192.169.69.26
                          TimestampSource PortDest PortSource IPDest IP
                          Jun 4, 2023 04:42:08.461453915 CEST5238753192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:08.584316015 CEST53523878.8.8.8192.168.2.3
                          Jun 4, 2023 04:42:13.804982901 CEST5692453192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:13.825361967 CEST53569248.8.8.8192.168.2.3
                          Jun 4, 2023 04:42:18.991372108 CEST6062553192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:19.019965887 CEST53606258.8.8.8192.168.2.3
                          Jun 4, 2023 04:42:24.148152113 CEST4930253192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:24.261750937 CEST53493028.8.8.8192.168.2.3
                          Jun 4, 2023 04:42:29.265285969 CEST5397553192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:29.294018984 CEST53539758.8.8.8192.168.2.3
                          Jun 4, 2023 04:42:34.246910095 CEST5113953192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:34.267290115 CEST53511398.8.8.8192.168.2.3
                          Jun 4, 2023 04:42:39.262290001 CEST5295553192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:39.283380985 CEST53529558.8.8.8192.168.2.3
                          Jun 4, 2023 04:42:44.172225952 CEST6058253192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:44.195631981 CEST53605828.8.8.8192.168.2.3
                          Jun 4, 2023 04:42:49.229825974 CEST5713453192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:49.352425098 CEST53571348.8.8.8192.168.2.3
                          Jun 4, 2023 04:42:54.336741924 CEST6205053192.168.2.38.8.8.8
                          Jun 4, 2023 04:42:54.450535059 CEST53620508.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:00.401382923 CEST5604253192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:00.430135012 CEST53560428.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:06.116441965 CEST5963653192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:06.145123959 CEST53596368.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:11.264379025 CEST5563853192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:11.382052898 CEST53556388.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:16.186063051 CEST5770453192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:16.313746929 CEST53577048.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:21.163583994 CEST6532053192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:21.191978931 CEST53653208.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:26.157421112 CEST6076753192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:26.178278923 CEST53607678.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:34.487503052 CEST6510753192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:34.508172035 CEST53651078.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:40.115076065 CEST5384853192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:40.144586086 CEST53538488.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:45.902225018 CEST5757153192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:45.922760963 CEST53575718.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:51.144181013 CEST5869153192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:51.269069910 CEST53586918.8.8.8192.168.2.3
                          Jun 4, 2023 04:43:57.385121107 CEST5330553192.168.2.38.8.8.8
                          Jun 4, 2023 04:43:57.499840975 CEST53533058.8.8.8192.168.2.3
                          Jun 4, 2023 04:44:02.610562086 CEST5943353192.168.2.38.8.8.8
                          Jun 4, 2023 04:44:02.639483929 CEST53594338.8.8.8192.168.2.3
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jun 4, 2023 04:42:08.461453915 CEST192.168.2.38.8.8.80xb877Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:13.804982901 CEST192.168.2.38.8.8.80x5851Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:18.991372108 CEST192.168.2.38.8.8.80xe43eStandard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:24.148152113 CEST192.168.2.38.8.8.80x19efStandard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:29.265285969 CEST192.168.2.38.8.8.80x3894Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:34.246910095 CEST192.168.2.38.8.8.80xb827Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:39.262290001 CEST192.168.2.38.8.8.80xeca7Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:44.172225952 CEST192.168.2.38.8.8.80x21c2Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:49.229825974 CEST192.168.2.38.8.8.80xd1fStandard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:54.336741924 CEST192.168.2.38.8.8.80x706eStandard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:00.401382923 CEST192.168.2.38.8.8.80x8b26Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:06.116441965 CEST192.168.2.38.8.8.80x3ccbStandard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:11.264379025 CEST192.168.2.38.8.8.80x76f0Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:16.186063051 CEST192.168.2.38.8.8.80x21faStandard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:21.163583994 CEST192.168.2.38.8.8.80x6884Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:26.157421112 CEST192.168.2.38.8.8.80x8134Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:34.487503052 CEST192.168.2.38.8.8.80x198dStandard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:40.115076065 CEST192.168.2.38.8.8.80x686Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:45.902225018 CEST192.168.2.38.8.8.80xaba2Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:51.144181013 CEST192.168.2.38.8.8.80x8ad3Standard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:57.385121107 CEST192.168.2.38.8.8.80x720dStandard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          Jun 4, 2023 04:44:02.610562086 CEST192.168.2.38.8.8.80x682bStandard query (0)podzeye.duckdns.orgA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jun 4, 2023 04:42:08.584316015 CEST8.8.8.8192.168.2.30xb877No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:13.825361967 CEST8.8.8.8192.168.2.30x5851No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:19.019965887 CEST8.8.8.8192.168.2.30xe43eNo error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:24.261750937 CEST8.8.8.8192.168.2.30x19efNo error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:29.294018984 CEST8.8.8.8192.168.2.30x3894No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:34.267290115 CEST8.8.8.8192.168.2.30xb827No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:39.283380985 CEST8.8.8.8192.168.2.30xeca7No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:44.195631981 CEST8.8.8.8192.168.2.30x21c2No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:49.352425098 CEST8.8.8.8192.168.2.30xd1fNo error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:42:54.450535059 CEST8.8.8.8192.168.2.30x706eNo error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:00.430135012 CEST8.8.8.8192.168.2.30x8b26No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:06.145123959 CEST8.8.8.8192.168.2.30x3ccbNo error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:11.382052898 CEST8.8.8.8192.168.2.30x76f0No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:16.313746929 CEST8.8.8.8192.168.2.30x21faNo error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:21.191978931 CEST8.8.8.8192.168.2.30x6884No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:26.178278923 CEST8.8.8.8192.168.2.30x8134No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:34.508172035 CEST8.8.8.8192.168.2.30x198dNo error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:40.144586086 CEST8.8.8.8192.168.2.30x686No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:45.922760963 CEST8.8.8.8192.168.2.30xaba2No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:51.269069910 CEST8.8.8.8192.168.2.30x8ad3No error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:43:57.499840975 CEST8.8.8.8192.168.2.30x720dNo error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                          Jun 4, 2023 04:44:02.639483929 CEST8.8.8.8192.168.2.30x682bNo error (0)podzeye.duckdns.org192.169.69.26A (IP address)IN (0x0001)false

                          Click to jump to process

                          Target ID:0
                          Start time:04:42:02
                          Start date:04/06/2023
                          Path:C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          Imagebase:0x2a0000
                          File size:546816 bytes
                          MD5 hash:81B7988B523FB109B834C76E7F0FEA10
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.380153441.0000000009E78000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.375141713.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.380153441.0000000009D51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:low

                          Target ID:1
                          Start time:04:42:07
                          Start date:04/06/2023
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jAqpXXDLkkJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA2.tmp
                          Imagebase:0x8f0000
                          File size:185856 bytes
                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:2
                          Start time:04:42:07
                          Start date:04/06/2023
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff745070000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:3
                          Start time:04:42:07
                          Start date:04/06/2023
                          Path:C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\HEUR-Trojan.MSIL.Taskun.gen-1617174ffdba50f5e.exe
                          Imagebase:0x460000
                          File size:546816 bytes
                          MD5 hash:81B7988B523FB109B834C76E7F0FEA10
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.640270105.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.631138634.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.635994119.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.628751592.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.640443999.0000000005500000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                          Reputation:low

                          No disassembly