Loading ...

Play interactive tourEdit tour

Analysis Report Devizni izvod za partiju 0050100073053.exe

Overview

General Information

Sample Name:Devizni izvod za partiju 0050100073053.exe
Analysis ID:411771
MD5:50ab414be17f4e03bee8f9c5cee06335
SHA1:d0def6e40e7858a1b8c46d46f24a6b29499c7c37
SHA256:333b1ae9552e6a65ab7c4edee6677746e801ebed73294795b9057e17a0e284e6
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Nanocore RAT
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Non Interactive PowerShell
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • Devizni izvod za partiju 0050100073053.exe (PID: 4504 cmdline: 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe' MD5: 50AB414BE17F4E03BEE8F9C5CEE06335)
    • powershell.exe (PID: 5488 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe' MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 5876 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe' MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 2148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 1744 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp2011.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 2104 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe' MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6792 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 50AB414BE17F4E03BEE8F9C5CEE06335)
    • powershell.exe (PID: 4708 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6092 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp864D.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 6644 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe' MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 1880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 4608 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 50AB414BE17F4E03BEE8F9C5CEE06335)
    • dhcpmon.exe (PID: 5356 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 50AB414BE17F4E03BEE8F9C5CEE06335)
    • dhcpmon.exe (PID: 900 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 50AB414BE17F4E03BEE8F9C5CEE06335)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "b90524a1-4a4b-41de-ac06-59066a86", "Group": "Panda", "Domain1": "emedoo.ddns.net", "Domain2": "127.0.0.1", "Port": 5230, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 50, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "emedoo.ddns.net", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x1151:$a: NanoCore
    • 0x11aa:$a: NanoCore
    • 0x11e7:$a: NanoCore
    • 0x1260:$a: NanoCore
    • 0x1490b:$a: NanoCore
    • 0x14920:$a: NanoCore
    • 0x14955:$a: NanoCore
    • 0x1e7b9:$a: NanoCore
    • 0x1e812:$a: NanoCore
    • 0x1e84f:$a: NanoCore
    • 0x1e8c8:$a: NanoCore
    • 0x31f73:$a: NanoCore
    • 0x31f88:$a: NanoCore
    • 0x31fbd:$a: NanoCore
    • 0x3fbd2:$a: NanoCore
    • 0x3fbf7:$a: NanoCore
    • 0x3fc50:$a: NanoCore
    • 0x11b3:$b: ClientPlugin
    • 0x11f0:$b: ClientPlugin
    • 0x1aee:$b: ClientPlugin
    • 0x1afb:$b: ClientPlugin
    0000000D.00000002.541194418.0000000003D8D000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x891dd:$x1: NanoCore.ClientPluginHost
      • 0x8921a:$x2: IClientNetworkHost
      • 0x8cd4d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 51 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        13.2.Devizni izvod za partiju 0050100073053.exe.2dc23b0.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x8ba5:$x1: NanoCore.ClientPluginHost
        • 0x15d17:$x1: NanoCore.ClientPluginHost
        • 0x1fb6f:$x1: NanoCore.ClientPluginHost
        • 0x27a9d:$x1: NanoCore.ClientPluginHost
        • 0x2da78:$x1: NanoCore.ClientPluginHost
        • 0x374eb:$x1: NanoCore.ClientPluginHost
        • 0x4191f:$x1: NanoCore.ClientPluginHost
        • 0x4c909:$x1: NanoCore.ClientPluginHost
        • 0x586b7:$x1: NanoCore.ClientPluginHost
        • 0x6440a:$x1: NanoCore.ClientPluginHost
        • 0x8bd2:$x2: IClientNetworkHost
        • 0x15d50:$x2: IClientNetworkHost
        • 0x1fba8:$x2: IClientNetworkHost
        • 0x27ad6:$x2: IClientNetworkHost
        • 0x37648:$x2: IClientNetworkHost
        • 0x41958:$x2: IClientNetworkHost
        • 0x4c923:$x2: IClientNetworkHost
        • 0x586d1:$x2: IClientNetworkHost
        • 0x64447:$x2: IClientNetworkHost
        13.2.Devizni izvod za partiju 0050100073053.exe.2dc23b0.4.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0x8b7f:$a: NanoCore
        • 0x8ba5:$a: NanoCore
        • 0x8c01:$a: NanoCore
        • 0x15a5f:$a: NanoCore
        • 0x15ab8:$a: NanoCore
        • 0x15aeb:$a: NanoCore
        • 0x15d17:$a: NanoCore
        • 0x15d93:$a: NanoCore
        • 0x163ac:$a: NanoCore
        • 0x164f5:$a: NanoCore
        • 0x169c9:$a: NanoCore
        • 0x16cb0:$a: NanoCore
        • 0x16cc7:$a: NanoCore
        • 0x1fb6f:$a: NanoCore
        • 0x1fbeb:$a: NanoCore
        • 0x224ce:$a: NanoCore
        • 0x27a9d:$a: NanoCore
        • 0x27b17:$a: NanoCore
        • 0x2da78:$a: NanoCore
        • 0x2dac2:$a: NanoCore
        • 0x2e71c:$a: NanoCore
        34.2.dhcpmon.exe.3f0e434.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xf7ad:$x1: NanoCore.ClientPluginHost
        • 0x28271:$x1: NanoCore.ClientPluginHost
        • 0xf7da:$x2: IClientNetworkHost
        • 0x2829e:$x2: IClientNetworkHost
        34.2.dhcpmon.exe.3f0e434.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xf7ad:$x2: NanoCore.ClientPluginHost
        • 0x28271:$x2: NanoCore.ClientPluginHost
        • 0x10888:$s4: PipeCreated
        • 0x2934c:$s4: PipeCreated
        • 0xf7c7:$s5: IClientLoggingHost
        • 0x2828b:$s5: IClientLoggingHost
        34.2.dhcpmon.exe.3f0e434.6.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          Click to see the 168 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe, ProcessId: 6196, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe, ProcessId: 6196, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          System Summary:

          barindex
          Sigma detected: Non Interactive PowerShellShow sources
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe', CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe', CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe' , ParentImage: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe, ParentProcessId: 4504, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe', ProcessId: 5488

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe, ProcessId: 6196, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe, ProcessId: 6196, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 0000000D.00000002.541194418.0000000003D8D000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "b90524a1-4a4b-41de-ac06-59066a86", "Group": "Panda", "Domain1": "emedoo.ddns.net", "Domain2": "127.0.0.1", "Port": 5230, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 50, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "emedoo.ddns.net", "BackupDNSServer": "8.8.4.4"}
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMetadefender: Detection: 20%Perma Link
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 48%
          Source: C:\Users\user\AppData\Roaming\AGYVBigGPY.exeMetadefender: Detection: 20%Perma Link
          Source: C:\Users\user\AppData\Roaming\AGYVBigGPY.exeReversingLabs: Detection: 48%
          Multi AV Scanner detection for submitted fileShow sources
          Source: Devizni izvod za partiju 0050100073053.exeVirustotal: Detection: 65%Perma Link
          Source: Devizni izvod za partiju 0050100073053.exeMetadefender: Detection: 20%Perma Link
          Source: Devizni izvod za partiju 0050100073053.exeReversingLabs: Detection: 48%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.541194418.0000000003D8D000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000003.297298308.0000000004098000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000022.00000002.383744500.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f0e434.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40a1ae9.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.dhcpmon.exe.52f2be0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f095fe.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d9b521.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.409d4c0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.dhcpmon.exe.52f2be0.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f12a5d.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b4629.24.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40497d1.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f0e434.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4040372.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.409868a.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4117419.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4112df0.8.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\AGYVBigGPY.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
          Machine Learning detection for sampleShow sources
          Source: Devizni izvod za partiju 0050100073053.exeJoe Sandbox ML: detected
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.unpackAvira: Label: TR/NanoCore.fadte
          Source: 34.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: Devizni izvod za partiju 0050100073053.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: Devizni izvod za partiju 0050100073053.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: Binary string: mscorrc.pdb source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.260890521.0000000004BB0000.00000002.00000001.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.545321090.00000000053C0000.00000002.00000001.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 4x nop then mov esp, ebp
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 4x nop then mov esp, ebp

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.7:49715 -> 79.134.225.71:5230
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.7:49720 -> 79.134.225.71:5230
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.7:49723 -> 79.134.225.71:5230
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.7:49725 -> 79.134.225.71:5230
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.7:49726 -> 79.134.225.71:5230
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.7:49727 -> 79.134.225.71:5230
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.7:49728 -> 79.134.225.71:5230
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.7:49730 -> 79.134.225.71:5230
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: emedoo.ddns.net
          Source: Malware configuration extractorURLs: 127.0.0.1
          Uses dynamic DNS servicesShow sources
          Source: unknownDNS query: name: emedoo.ddns.net
          Source: global trafficTCP traffic: 192.168.2.7:49715 -> 79.134.225.71:5230
          Source: Joe Sandbox ViewIP Address: 79.134.225.71 79.134.225.71
          Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_05092B9A WSARecv,
          Source: unknownDNS traffic detected: queries for: emedoo.ddns.net
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/account/update_profile.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/account/update_profile.xmlQhttp://api.twitter.com/1.1/favorites.xmlghttp:
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/account/update_profile_image.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/account/verify_credentials.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/blocks/blocking.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/blocks/blocking.xmlUhttp://api.twitter.com/1.1/report_spam.xml_http://api
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/blocks/blocking.xmldhttp://api.twitter.com/1.1/blocks/blocking/ids.xml
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/blocks/blocking/ids.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/blocks/create/
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/blocks/destroy/
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/direct_messages.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/direct_messages.xmlghttp://api.twitter.com/1.1/direct_messages/sent.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/direct_messages.xmlthttp://api.twitter.com/1.1/direct_messages/destroy/
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/direct_messages/destroy/
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/direct_messages/new.xml?user=
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/direct_messages/new.xmlfhttp://api.twitter.com/1.1/direct_messages/sent.x
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/direct_messages/sent.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/favorites.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/favorites.xmlXhttp://api.twitter.com/1.1/followers/ids.xmlThttp://api.twi
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/favorites/create/
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/favorites/destroy/
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/followers/ids.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/friends/ids.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/friends/ids.xmlYhttp://api.twitter.com/1.1/followers/ids.xmlshttp://api.t
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/friendships/create/
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/friendships/destroy/
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/friendships/show.xml?
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/report_spam.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/report_spam.xmlJhttp://search.twitter.com/search.atomfhttp://api.twitter.
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/destroy/
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/followers.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/friends.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/friends.xmlbhttp://api.twitter.com/1.1/statuses/followers.xmlpht
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/friends_timeline.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/home_timeline.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/mentions.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/mentions.xmlnhttp://api.twitter.com/1.1/statuses/public_timeline
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/public_timeline.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/replies.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/replies.xmlfhttp://api.twitter.com/1.1/statuses/retweet/
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/retweet/
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/retweeted_by_me.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/retweets/id.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/retweets/id.xml_http://api.twitter.com/1.1/statuses/replies.xmlS
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/retweets_of_me.xml
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/show/
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/update.xml?status=
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/statuses/update.xmljhttp://api.twitter.com/1.1/statuses/user_timeline.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/statuses/user_timeline.xml
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/trends/
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/trends/available.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/trends/available.xmlThttp://api.twitter.com/1.1/trends/
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/users/search.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://api.twitter.com/1.1/users/search.xmlRhttp://api.twitter.com/1.1/users/show.xmlvhttp://api.twi
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://api.twitter.com/1.1/users/show.xml
          Source: powershell.exe, 00000003.00000002.530350749.000000000377B000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: powershell.exe, 00000009.00000003.496419975.0000000007787000.00000004.00000001.sdmpString found in binary or memory: http://crl.mi
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpString found in binary or memory: http://google.com
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://im.twitvid.com/api/upload
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://im.twitvid.com/api/uploadrhttp://api.twitter.com/1.1/account/verify_credentials.xmljhttp://ap
          Source: powershell.exe, 00000005.00000002.543192744.0000000006172000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.430789624.0000000007721000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000003.00000002.537074533.0000000005083000.00000004.00000001.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.pngH
          Source: powershell.exe, 00000003.00000002.537074533.0000000005083000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: powershell.exe, 00000003.00000002.532843494.0000000004F41000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.532258311.0000000005111000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.534281663.0000000004591000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000003.00000002.537074533.0000000005083000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://search.twitter.com/search.atom
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://search.twitter.com/search.atomKhttp://search.twitter.com/trends.json
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://search.twitter.com/trends.json
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://search.twitter.com/trends/current.json
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://search.twitter.com/trends/current.jsonWhttp://search.twitter.com/trends/daily.jsonYhttp://sea
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://search.twitter.com/trends/daily.json
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://search.twitter.com/trends/weekly.json
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/audio.mp3?id=
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/getContent?id=
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://twic.li/api/getUsersContent?userid=
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/getUsersContent?userid=)&content_type=photos
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/getUsersContent?username=
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/photo.jpg?id=
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://twic.li/api/uploadAudio
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://twic.li/api/uploadAudioAndTweet
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/uploadAudioAndTweetUContent-Disposition:
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/uploadAudioLhttp://twic.li/api/uploadAudioAndTweet:http://twic.li/api/getContentD
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/uploadAudioiContent-disposition:
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://twic.li/api/uploadPhoto
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/uploadPhotoAndTweet
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/uploadPhotoLhttp://twic.li/api/uploadPhotoAndTweet
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/uploadPhotokContent-Disposition:
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/uploadVideo
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/uploadVideoAndTweet
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/uploadVideoLhttp://twic.li/api/uploadVideoAndTweet
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://twic.li/api/video.flv?id=
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twic.li/api/video.flv?id=-No
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://twitter.com/oauth/access_token
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twitter.com/oauth/access_token#?x_auth_username=#&x_auth_password=1&x_auth_mode=client_authUh
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://twitter.com/oauth/request_token
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twitter.com/oauth/request_token-
          Source: Devizni izvod za partiju 0050100073053.exeString found in binary or memory: http://twitter.com/statuses/retweeted_to_me.xml
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://twitter.com/statuses/retweeted_to_me.xmlfhttp://api.twitter.com/1.1/statuses/retweets/id.xmll
          Source: powershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.430789624.0000000007721000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 00000003.00000002.537074533.0000000005083000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlH
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://yfrog.com/api/uploadAndPost
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: http://yfrog.com/api/uploadAndPostAmultipart/form-data
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: https://api.twitter.com/oauth/access_token
          Source: powershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/License
          Source: powershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.430789624.0000000007721000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000003.00000002.537074533.0000000005083000.00000004.00000001.sdmpString found in binary or memory: https://github.com/Pester/PesterH
          Source: powershell.exe, 00000003.00000003.415909540.00000000058E5000.00000004.00000001.sdmpString found in binary or memory: https://go.micro
          Source: Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: https://im.twitvid.com/api/authenticate
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpString found in binary or memory: https://im.twitvid.com/api/authenticateCapplication/x-www-form-urlencoded
          Source: powershell.exe, 00000005.00000002.543192744.0000000006172000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.541194418.0000000003D8D000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000003.297298308.0000000004098000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000022.00000002.383744500.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f0e434.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40a1ae9.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.dhcpmon.exe.52f2be0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f095fe.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d9b521.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.409d4c0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.dhcpmon.exe.52f2be0.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f12a5d.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b4629.24.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40497d1.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f0e434.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4040372.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.409868a.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4117419.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4112df0.8.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.552591050.0000000006A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.546929623.0000000005950000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.546313038.00000000055C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.551440197.0000000006890000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.552438629.0000000006A20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.546995313.00000000059E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.551688994.00000000068C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000003.297298308.0000000004098000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.551733160.00000000068D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.551056353.0000000006730000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.547173286.0000000005A80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.546044032.0000000005580000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.546082364.0000000005590000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000022.00000002.383744500.0000000003EC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.535153965.0000000002D8C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.545285946.00000000053A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dc23b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dc23b0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 34.2.dhcpmon.exe.3f0e434.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5580000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fc4cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6730000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.559e8a4.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fd355c.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.59e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dc23b0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3ea8041.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dd69e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dd69e4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40a1ae9.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40a1ae9.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5580000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.55c0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 19.2.dhcpmon.exe.52f2be0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 19.2.dhcpmon.exe.52f2be0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.412b61c.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2d412c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a50000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5950000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.68d0000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fc9957.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 34.2.dhcpmon.exe.3f095fe.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 34.2.dhcpmon.exe.3f095fe.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.68c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.68d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3ea33a2.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3ea33a2.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d9b521.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.53a0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409d4c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409d4c0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 19.2.dhcpmon.exe.52f2be0.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 19.2.dhcpmon.exe.52f2be0.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 34.2.dhcpmon.exe.2ee3ac8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5594c9f.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6730000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6890000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3e9a16e.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5950000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 34.2.dhcpmon.exe.2ed14ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.55c0000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.59e0000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3e9a16e.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2db6170.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 34.2.dhcpmon.exe.3f12a5d.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fc4cb8.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a50000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b4629.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5a80000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a20000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a20000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6890000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40497d1.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40497d1.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 34.2.dhcpmon.exe.3f0e434.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5590000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5590000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.4040372.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.4040372.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409868a.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409868a.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.4117419.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.412b61c.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2db6170.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2db6170.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.4112df0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_024D180E NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_024D17DD NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_050915CE NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_05091593 NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AEE60
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AE7F8
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AE430
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A30F8
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A10F0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A08F7
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A0CA0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A2918
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A39EF
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A19E7
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A15A0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A6271
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A1E1F
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AAAC8
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AB2A0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AB748
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A6770
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A676F
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A6B11
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A13DF
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A5FD0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A5FE0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AC7B0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AC030
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A10E1
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A0C9F
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AF150
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A5578
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A6570
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A556B
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A6560
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A2915
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025AA530
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A699F
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A69A0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_05BD19A6
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_05BD0006
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_05BD0070
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031BC348
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031BF690
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031B95C0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031BDAB0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031BB9B8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031B8210
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031B6730
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031B67A8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031B67A7
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031B9DF0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031BB9B8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031C0040
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031CEE30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031C2EA0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031C2EA0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031CEE30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031CFB98
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031C2EA0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031CEE30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031C2EA0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031C2EA0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031C8D53
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0106E028
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0106F890
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0106BD18
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_010F8919
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_010F44CF
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_010F8919
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_010F44CF
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_010F8919
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_010F8919
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_010F8919
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0318C340
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0318F7D0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0318DBF0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_031899C0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0318BDB8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_03188210
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_0318BDB8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_031867A8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_031867A7
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_010FE7DB
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008CB218
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008CD300
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008CF4F7
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008CB7A0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008C8E20
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008C6008
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008CB218
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008C9650
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008C7A70
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008C7EE0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008C5FFA
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_00F47AC1
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F63850
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F68938
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F6B208
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F623A0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F62FA8
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F6306F
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F695FF
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F69DE0
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F69538
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D6E10
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D6210
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D2600
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D76B8
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D8980
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D3200
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D9647
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D6ED7
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D32C7
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D7F9B
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_061D9580
          Source: Devizni izvod za partiju 0050100073053.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: AGYVBigGPY.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233546518.0000000000304000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFXAssembly.exe. vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.258236925.0000000003BD8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.260833469.0000000004B90000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.263221899.00000000058F0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.263832226.00000000059F0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.263832226.00000000059F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.260890521.0000000004BB0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245540498.0000000000344000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFXAssembly.exe. vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000C.00000002.246917473.00000000004D4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFXAssembly.exe. vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.552591050.0000000006A50000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.508512327.0000000000624000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFXAssembly.exe. vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.542047057.0000000003FB7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.542047057.0000000003FB7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.542047057.0000000003FB7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.542047057.0000000003FB7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.545321090.00000000053C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Devizni izvod za partiju 0050100073053.exe
          Source: Devizni izvod za partiju 0050100073053.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000002.552591050.0000000006A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.552591050.0000000006A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000002.546929623.0000000005950000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.546929623.0000000005950000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.546313038.00000000055C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.546313038.00000000055C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.551440197.0000000006890000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.551440197.0000000006890000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000002.552438629.0000000006A20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.552438629.0000000006A20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000002.546995313.00000000059E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.546995313.00000000059E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.551688994.00000000068C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.551688994.00000000068C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000003.297298308.0000000004098000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.551733160.00000000068D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.551733160.00000000068D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000002.551056353.0000000006730000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.551056353.0000000006730000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000002.547173286.0000000005A80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.547173286.0000000005A80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000002.546044032.0000000005580000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.546044032.0000000005580000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0000000D.00000002.546082364.0000000005590000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.546082364.0000000005590000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000022.00000002.383744500.0000000003EC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.535153965.0000000002D8C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.545285946.00000000053A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.545285946.00000000053A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dc23b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dc23b0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 34.2.dhcpmon.exe.3f0e434.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 34.2.dhcpmon.exe.3f0e434.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5580000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5580000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fc4cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fc4cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6730000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6730000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.559e8a4.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.559e8a4.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fd355c.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fd355c.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.59e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.59e0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dc23b0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dc23b0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3ea8041.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3ea8041.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dd69e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2dd69e4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40a1ae9.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40a1ae9.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40a1ae9.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5580000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5580000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.55c0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.55c0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 19.2.dhcpmon.exe.52f2be0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 19.2.dhcpmon.exe.52f2be0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 19.2.dhcpmon.exe.52f2be0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.412b61c.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.412b61c.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2d412c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2d412c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a50000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a50000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5950000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5950000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.68d0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.68d0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fc9957.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fc9957.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 34.2.dhcpmon.exe.3f095fe.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 34.2.dhcpmon.exe.3f095fe.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 34.2.dhcpmon.exe.3f095fe.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.68c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.68c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.68d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.68d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3ea33a2.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3ea33a2.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3ea33a2.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d9b521.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d9b521.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3ea33a2.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.53a0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.53a0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409d4c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409d4c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409d4c0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 19.2.dhcpmon.exe.52f2be0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 19.2.dhcpmon.exe.52f2be0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 19.2.dhcpmon.exe.52f2be0.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 34.2.dhcpmon.exe.2ee3ac8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 34.2.dhcpmon.exe.2ee3ac8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5594c9f.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5594c9f.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6730000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6730000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6890000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6890000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3e9a16e.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3e9a16e.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5950000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5950000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 34.2.dhcpmon.exe.2ed14ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 34.2.dhcpmon.exe.2ed14ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.55c0000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.55c0000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.59e0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.59e0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3e9a16e.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3e9a16e.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2db6170.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2db6170.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 34.2.dhcpmon.exe.3f12a5d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 34.2.dhcpmon.exe.3f12a5d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fc4cb8.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.3fc4cb8.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a50000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a50000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b4629.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b4629.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5a80000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5a80000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a20000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a20000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a20000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6a20000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6890000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.6890000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40497d1.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40497d1.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.40497d1.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 34.2.dhcpmon.exe.3f0e434.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 34.2.dhcpmon.exe.3f0e434.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5590000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5590000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5590000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.5590000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.4040372.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.4040372.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.4040372.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409868a.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409868a.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.409868a.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.4117419.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.412b61c.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2db6170.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.Devizni izvod za partiju 0050100073053.exe.2db6170.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.3.Devizni izvod za partiju 0050100073053.exe.4112df0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Devizni izvod za partiju 0050100073053.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: AGYVBigGPY.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@35/31@9/2
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_024D114E AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_024D1117 AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_0509138E AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_05091357 AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile created: C:\Program Files (x86)\DHCP Monitor
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile created: C:\Users\user\AppData\Roaming\AGYVBigGPY.exeJump to behavior
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeMutant created: \Sessions\1\BaseNamedObjects\FBmlKPsCRkTxrXOa
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5340:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4428:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2148:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1880:120:WilError_01
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5852:120:WilError_01
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b90524a1-4a4b-41de-ac06-59066a861712}
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6076:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5304:120:WilError_01
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2011.tmpJump to behavior
          Source: Devizni izvod za partiju 0050100073053.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
          Source: Devizni izvod za partiju 0050100073053.exeVirustotal: Detection: 65%
          Source: Devizni izvod za partiju 0050100073053.exeMetadefender: Detection: 20%
          Source: Devizni izvod za partiju 0050100073053.exeReversingLabs: Detection: 48%
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile read: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe'
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp2011.tmp'
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp864D.tmp'
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp2011.tmp'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp864D.tmp'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
          Source: Devizni izvod za partiju 0050100073053.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: Devizni izvod za partiju 0050100073053.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: Binary string: mscorrc.pdb source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.260890521.0000000004BB0000.00000002.00000001.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.545321090.00000000053C0000.00000002.00000001.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_00C392D9 push ebx; retf
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_00C36A7C push 6B7000C3h; ret
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_00C36B51 push 6B7000C3h; ret
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_00C3631D push ebx; retf
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_00C36B28 push 6B7000C3h; ret
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_00C36CC1 push 6CE000C3h; ret
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_00C36CB3 push 6CE000C3h; ret
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_00C36D79 push 0200C36Dh; ret
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A201A pushfd ; iretd
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A902C push esp; ret
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 2_2_025A94FD push ebx; iretd
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031B0720 push eax; ret
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_031B06E0 push esp; ret
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_01069000 push eax; mov dword ptr [esp], ecx
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_01065B19 push eax; mov dword ptr [esp], edx
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_01065EC0 push eax; mov dword ptr [esp], edx
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_01065ED0 push eax; mov dword ptr [esp], edx
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_03183D72 push esp; retf
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_008C6F52 push es; ret
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_00F462D4 push ebx; retf
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_00F462D1 push ebx; retf
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_00F4769F push es; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.66159215719
          Source: initial sampleStatic PE information: section name: .text entropy: 7.66159215719
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile created: C:\Users\user\AppData\Roaming\AGYVBigGPY.exeJump to dropped file
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

          Boot Survival:

          barindex
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp2011.tmp'

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeFile opened: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.364891578.000000000378B000.00000004.00000001.sdmp, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3086
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4301
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4110
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2946
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3846
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2879
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 785
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 429
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe TID: 4964Thread sleep time: -102902s >= -30000s
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe TID: 2324Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6172Thread sleep time: -1844674407370954s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6172Thread sleep time: -40000s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5400Thread sleep count: 4110 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6204Thread sleep count: 43 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5400Thread sleep count: 2946 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3352Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3352Thread sleep time: -30000s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6156Thread sleep count: 3846 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6256Thread sleep count: 50 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5804Thread sleep count: 2879 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3272Thread sleep time: -1844674407370954s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3272Thread sleep time: -40000s >= -30000s
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe TID: 6316Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe TID: 6324Thread sleep time: -37000s >= -30000s
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe TID: 6308Thread sleep time: -2160000s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6796Thread sleep time: -100824s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6832Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5412Thread sleep count: 785 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6532Thread sleep count: 67 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6696Thread sleep count: 429 > 30
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6720Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_0509101A GetSystemInfo,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeThread delayed: delay time: 102902
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 100824
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: powershell.exe, 00000003.00000003.415909540.00000000058E5000.00000004.00000001.sdmp, powershell.exe, 00000005.00000003.444940190.0000000005AC7000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpBinary or memory string: k:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
          Source: powershell.exe, 00000003.00000003.415909540.00000000058E5000.00000004.00000001.sdmp, powershell.exe, 00000005.00000003.444940190.0000000005AC7000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.446464104.0000000004F63000.00000004.00000001.sdmpBinary or memory string: Hyper-V
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: Devizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_04F6F8B8 LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess token adjusted: Debug
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Adds a directory exclusion to Windows DefenderShow sources
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeMemory written: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe base: 400000 value starts with: 4D5A
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp2011.tmp'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeProcess created: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp864D.tmp'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: powershell.exe, 00000003.00000002.531329214.0000000003B30000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.533165277.0000000003180000.00000002.00000001.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.523845475.0000000001330000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.538916843.0000000002EFF000.00000004.00000001.sdmpBinary or memory string: Program Manager
          Source: powershell.exe, 00000003.00000002.531329214.0000000003B30000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.533165277.0000000003180000.00000002.00000001.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.523845475.0000000001330000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: powershell.exe, 00000003.00000002.531329214.0000000003B30000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.533165277.0000000003180000.00000002.00000001.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.523845475.0000000001330000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.538916843.0000000002EFF000.00000004.00000001.sdmpBinary or memory string: Program ManagerX
          Source: powershell.exe, 00000003.00000002.531329214.0000000003B30000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.533165277.0000000003180000.00000002.00000001.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.523845475.0000000001330000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000002.538916843.0000000002EFF000.00000004.00000001.sdmpBinary or memory string: Program Manager4P
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_0509339A GetSystemTimes,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.541194418.0000000003D8D000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000003.297298308.0000000004098000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000022.00000002.383744500.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f0e434.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40a1ae9.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.dhcpmon.exe.52f2be0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f095fe.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d9b521.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.409d4c0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.dhcpmon.exe.52f2be0.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f12a5d.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b4629.24.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40497d1.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f0e434.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4040372.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.409868a.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4117419.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4112df0.8.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
          Source: Devizni izvod za partiju 0050100073053.exe, 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.541194418.0000000003D8D000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000003.297298308.0000000004098000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000022.00000002.383744500.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f0e434.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40a1ae9.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.dhcpmon.exe.52f2be0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f095fe.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d9b521.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.409d4c0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.dhcpmon.exe.52f2be0.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.3d96ef8.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40451a8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f12a5d.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.Devizni izvod za partiju 0050100073053.exe.56b4629.24.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.40497d1.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 34.2.dhcpmon.exe.3f0e434.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Devizni izvod za partiju 0050100073053.exe.3b220e0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4040372.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.409868a.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4117419.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.3.Devizni izvod za partiju 0050100073053.exe.4112df0.8.raw.unpack, type: UNPACKEDPE
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_050926DE bind,
          Source: C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exeCode function: 13_2_0509268C bind,

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools11Input Capture11System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsProcess Injection112Obfuscated Files or Information3LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Software Packing3Security Account ManagerSystem Information Discovery14SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading2NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion31LSA SecretsSecurity Software Discovery221SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol21Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncVirtualization/Sandbox Evasion31Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 411771 Sample: Devizni izvod za partiju 00... Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 64 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->64 66 Found malware configuration 2->66 68 Malicious sample detected (through community Yara rule) 2->68 70 13 other signatures 2->70 7 Devizni izvod za partiju 0050100073053.exe 7 2->7         started        11 dhcpmon.exe 2->11         started        process3 file4 46 C:\Users\user\AppData\...\AGYVBigGPY.exe, PE32 7->46 dropped 48 C:\Users\...\AGYVBigGPY.exe:Zone.Identifier, ASCII 7->48 dropped 50 C:\Users\user\AppData\Local\...\tmp2011.tmp, XML 7->50 dropped 52 Devizni izvod za p...50100073053.exe.log, ASCII 7->52 dropped 72 Adds a directory exclusion to Windows Defender 7->72 74 Injects a PE file into a foreign processes 7->74 13 Devizni izvod za partiju 0050100073053.exe 7->13         started        18 powershell.exe 22 7->18         started        20 powershell.exe 25 7->20         started        28 4 other processes 7->28 22 powershell.exe 11->22         started        24 schtasks.exe 11->24         started        26 powershell.exe 11->26         started        30 3 other processes 11->30 signatures5 process6 dnsIp7 60 emedoo.ddns.net 79.134.225.71, 49715, 49720, 49723 FINK-TELECOM-SERVICESCH Switzerland 13->60 62 192.168.2.1 unknown unknown 13->62 54 C:\Program Files (x86)\...\dhcpmon.exe, PE32 13->54 dropped 56 C:\Users\user\AppData\Roaming\...\run.dat, data 13->56 dropped 58 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 13->58 dropped 76 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->76 32 conhost.exe 18->32         started        34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        38 conhost.exe 24->38         started        40 conhost.exe 26->40         started        42 conhost.exe 28->42         started        44 conhost.exe 28->44         started        file8 signatures9 process10

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Devizni izvod za partiju 0050100073053.exe66%VirustotalBrowse
          Devizni izvod za partiju 0050100073053.exe24%MetadefenderBrowse
          Devizni izvod za partiju 0050100073053.exe48%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
          Devizni izvod za partiju 0050100073053.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\AGYVBigGPY.exe100%Joe Sandbox ML
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe24%MetadefenderBrowse
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe48%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
          C:\Users\user\AppData\Roaming\AGYVBigGPY.exe24%MetadefenderBrowse
          C:\Users\user\AppData\Roaming\AGYVBigGPY.exe48%ReversingLabsByteCode-MSIL.Backdoor.NanoCore

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          13.2.Devizni izvod za partiju 0050100073053.exe.56b0000.23.unpack100%AviraTR/NanoCore.fadteDownload File
          34.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          13.2.Devizni izvod za partiju 0050100073053.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

          Domains

          SourceDetectionScannerLabelLink
          emedoo.ddns.net5%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://im.twitvid.com/api/upload0%VirustotalBrowse
          http://im.twitvid.com/api/upload0%Avira URL Cloudsafe
          http://twic.li/api/uploadAudioAndTweet0%Avira URL Cloudsafe
          http://twic.li/api/video.flv?id=-No0%Avira URL Cloudsafe
          http://yfrog.com/api/uploadAndPostAmultipart/form-data0%Avira URL Cloudsafe
          https://im.twitvid.com/api/authenticate0%Avira URL Cloudsafe
          http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
          http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
          http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
          https://go.micro0%URL Reputationsafe
          https://go.micro0%URL Reputationsafe
          https://go.micro0%URL Reputationsafe
          http://twic.li/api/uploadVideoAndTweet0%Avira URL Cloudsafe
          https://contoso.com/Icon0%URL Reputationsafe
          https://contoso.com/Icon0%URL Reputationsafe
          https://contoso.com/Icon0%URL Reputationsafe
          http://twic.li/api/photo.jpg?id=0%Avira URL Cloudsafe
          http://twic.li/api/getUsersContent?userid=)&content_type=photos0%Avira URL Cloudsafe
          http://twic.li/api/getUsersContent?userid=0%Avira URL Cloudsafe
          http://twic.li/api/uploadPhotoAndTweet0%Avira URL Cloudsafe
          http://twic.li/api/getContent?id=0%Avira URL Cloudsafe
          emedoo.ddns.net0%Avira URL Cloudsafe
          http://twic.li/api/uploadAudio0%Avira URL Cloudsafe
          http://yfrog.com/api/uploadAndPost0%Avira URL Cloudsafe
          http://twic.li/api/uploadAudioiContent-disposition:0%Avira URL Cloudsafe
          http://twic.li/api/video.flv?id=0%Avira URL Cloudsafe
          http://twic.li/api/getUsersContent?username=0%Avira URL Cloudsafe
          https://contoso.com/License0%URL Reputationsafe
          https://contoso.com/License0%URL Reputationsafe
          https://contoso.com/License0%URL Reputationsafe
          http://twic.li/api/uploadAudioAndTweetUContent-Disposition:0%Avira URL Cloudsafe
          https://im.twitvid.com/api/authenticateCapplication/x-www-form-urlencoded0%Avira URL Cloudsafe
          http://twic.li/api/uploadVideoLhttp://twic.li/api/uploadVideoAndTweet0%Avira URL Cloudsafe
          http://twic.li/api/uploadVideo0%Avira URL Cloudsafe
          https://contoso.com/0%URL Reputationsafe
          https://contoso.com/0%URL Reputationsafe
          https://contoso.com/0%URL Reputationsafe
          http://twic.li/api/uploadPhoto0%Avira URL Cloudsafe
          http://twic.li/api/uploadPhotokContent-Disposition:0%Avira URL Cloudsafe
          127.0.0.10%Avira URL Cloudsafe
          http://twic.li/api/uploadAudioLhttp://twic.li/api/uploadAudioAndTweet:http://twic.li/api/getContentD0%Avira URL Cloudsafe
          http://twic.li/api/uploadPhotoLhttp://twic.li/api/uploadPhotoAndTweet0%Avira URL Cloudsafe
          http://im.twitvid.com/api/uploadrhttp://api.twitter.com/1.1/account/verify_credentials.xmljhttp://ap0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          emedoo.ddns.net
          79.134.225.71
          truetrueunknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          emedoo.ddns.nettrue
          • Avira URL Cloud: safe
          unknown
          127.0.0.1true
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://im.twitvid.com/api/uploadDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://api.twitter.com/1.1/statuses/mentions.xmlDevizni izvod za partiju 0050100073053.exefalse
            high
            http://api.twitter.com/1.1/blocks/blocking.xmldhttp://api.twitter.com/1.1/blocks/blocking/ids.xmlDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
              high
              http://api.twitter.com/1.1/statuses/retweeted_by_me.xmlDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                high
                http://api.twitter.com/1.1/statuses/friends_timeline.xmlDevizni izvod za partiju 0050100073053.exefalse
                  high
                  http://api.twitter.com/1.1/direct_messages.xmlDevizni izvod za partiju 0050100073053.exefalse
                    high
                    http://twic.li/api/uploadAudioAndTweetDevizni izvod za partiju 0050100073053.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssDevizni izvod za partiju 0050100073053.exe, 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmpfalse
                      high
                      http://api.twitter.com/1.1/blocks/destroy/Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                        high
                        http://api.twitter.com/1.1/direct_messages/new.xmlfhttp://api.twitter.com/1.1/direct_messages/sent.xDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                          high
                          http://api.twitter.com/1.1/report_spam.xmlJhttp://search.twitter.com/search.atomfhttp://api.twitter.Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                            high
                            http://twic.li/api/video.flv?id=-NoDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://api.twitter.com/1.1/account/update_profile.xmlDevizni izvod za partiju 0050100073053.exefalse
                              high
                              http://yfrog.com/api/uploadAndPostAmultipart/form-dataDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://api.twitter.com/1.1/statuses/show/Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                high
                                http://api.twitter.com/1.1/friendships/show.xml?Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                  high
                                  https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.543192744.0000000006172000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpfalse
                                    high
                                    http://search.twitter.com/trends/current.jsonDevizni izvod za partiju 0050100073053.exefalse
                                      high
                                      http://api.twitter.com/1.1/statuses/friends.xmlDevizni izvod za partiju 0050100073053.exefalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.532843494.0000000004F41000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.532258311.0000000005111000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.534281663.0000000004591000.00000004.00000001.sdmpfalse
                                          high
                                          http://api.twitter.com/1.1/report_spam.xmlDevizni izvod za partiju 0050100073053.exefalse
                                            high
                                            https://im.twitvid.com/api/authenticateDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://twitter.com/oauth/request_token-Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                              high
                                              http://api.twitter.com/1.1/statuses/destroy/Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                high
                                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.430789624.0000000007721000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.537074533.0000000005083000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://twitter.com/oauth/access_token#?x_auth_username=#&x_auth_password=1&x_auth_mode=client_authUhDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                    high
                                                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.430789624.0000000007721000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpfalse
                                                      high
                                                      http://api.twitter.com/1.1/statuses/public_timeline.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                        high
                                                        https://go.micropowershell.exe, 00000003.00000003.415909540.00000000058E5000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://api.twitter.com/1.1/trends/available.xmlThttp://api.twitter.com/1.1/trends/Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                          high
                                                          http://api.twitter.com/1.1/account/update_profile.xmlQhttp://api.twitter.com/1.1/favorites.xmlghttp:Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                            high
                                                            http://twic.li/api/uploadVideoAndTweetDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://contoso.com/Iconpowershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://api.twitter.com/1.1/direct_messages/sent.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                              high
                                                              http://api.twitter.com/1.1/favorites/destroy/Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                high
                                                                http://api.twitter.com/1.1/trends/available.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                  high
                                                                  http://twic.li/api/photo.jpg?id=Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://twic.li/api/getUsersContent?userid=)&content_type=photosDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://twic.li/api/getUsersContent?userid=Devizni izvod za partiju 0050100073053.exefalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.430789624.0000000007721000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    http://api.twitter.com/1.1/favorites/create/Devizni izvod za partiju 0050100073053.exefalse
                                                                      high
                                                                      http://twic.li/api/uploadPhotoAndTweetDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://api.twitter.com/1.1/statuses/replies.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                        high
                                                                        http://api.twitter.com/1.1/statuses/friends.xmlbhttp://api.twitter.com/1.1/statuses/followers.xmlphtDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                          high
                                                                          http://twic.li/api/getContent?id=Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://api.twitter.com/1.1/account/update_profile_image.xmlDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                            high
                                                                            http://api.twitter.com/1.1/users/show.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                              high
                                                                              http://twitter.com/oauth/request_tokenDevizni izvod za partiju 0050100073053.exefalse
                                                                                high
                                                                                http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.537074533.0000000005083000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.535788541.0000000005251000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.538651440.00000000046D7000.00000004.00000001.sdmpfalse
                                                                                  high
                                                                                  http://api.twitter.com/1.1/direct_messages/destroy/Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                    high
                                                                                    http://twic.li/api/uploadAudioDevizni izvod za partiju 0050100073053.exefalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://api.twitter.com/1.1/direct_messages/new.xml?user=Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                      high
                                                                                      http://twitter.com/oauth/access_tokenDevizni izvod za partiju 0050100073053.exefalse
                                                                                        high
                                                                                        http://yfrog.com/api/uploadAndPostDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        http://twic.li/api/uploadAudioiContent-disposition:Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        http://api.twitter.com/1.1/users/search.xmlRhttp://api.twitter.com/1.1/users/show.xmlvhttp://api.twiDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                          high
                                                                                          http://api.twitter.com/1.1/statuses/replies.xmlfhttp://api.twitter.com/1.1/statuses/retweet/Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                            high
                                                                                            http://api.twitter.com/1.1/blocks/blocking.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                                              high
                                                                                              http://twitter.com/statuses/retweeted_to_me.xmlfhttp://api.twitter.com/1.1/statuses/retweets/id.xmllDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                high
                                                                                                http://api.twitter.com/1.1/Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                  high
                                                                                                  http://search.twitter.com/search.atomDevizni izvod za partiju 0050100073053.exefalse
                                                                                                    high
                                                                                                    http://twic.li/api/video.flv?id=Devizni izvod za partiju 0050100073053.exefalse
                                                                                                    • Avira URL Cloud: safe
                                                                                                    unknown
                                                                                                    http://twic.li/api/getUsersContent?username=Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                    • Avira URL Cloud: safe
                                                                                                    unknown
                                                                                                    https://github.com/Pester/PesterHpowershell.exe, 00000003.00000002.537074533.0000000005083000.00000004.00000001.sdmpfalse
                                                                                                      high
                                                                                                      https://contoso.com/Licensepowershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      • URL Reputation: safe
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://api.twitter.com/1.1/statuses/mentions.xmlnhttp://api.twitter.com/1.1/statuses/public_timelineDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                        high
                                                                                                        http://api.twitter.com/1.1/friendships/destroy/Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                          high
                                                                                                          http://api.twitter.com/1.1/statuses/update.xml?status=Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                            high
                                                                                                            http://twic.li/api/uploadAudioAndTweetUContent-Disposition:Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown
                                                                                                            https://im.twitvid.com/api/authenticateCapplication/x-www-form-urlencodedDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown
                                                                                                            http://twic.li/api/uploadVideoLhttp://twic.li/api/uploadVideoAndTweetDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown
                                                                                                            http://search.twitter.com/trends/weekly.jsonDevizni izvod za partiju 0050100073053.exefalse
                                                                                                              high
                                                                                                              https://api.twitter.com/oauth/access_tokenDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                high
                                                                                                                http://search.twitter.com/search.atomKhttp://search.twitter.com/trends.jsonDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                  high
                                                                                                                  http://twic.li/api/uploadVideoDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                  • Avira URL Cloud: safe
                                                                                                                  unknown
                                                                                                                  https://contoso.com/powershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  • URL Reputation: safe
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  http://twic.li/api/uploadPhotoDevizni izvod za partiju 0050100073053.exefalse
                                                                                                                  • Avira URL Cloud: safe
                                                                                                                  unknown
                                                                                                                  http://api.twitter.com/1.1/blocks/create/Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                    high
                                                                                                                    http://api.twitter.com/1.1/statuses/retweet/Devizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://api.twitter.com/1.1/blocks/blocking/ids.xmlDevizni izvod za partiju 0050100073053.exe, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://api.twitter.com/1.1/favorites.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                                                                          high
                                                                                                                          http://api.twitter.com/1.1/statuses/home_timeline.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                                                                            high
                                                                                                                            http://api.twitter.com/1.1/account/verify_credentials.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                                                                              high
                                                                                                                              http://twic.li/api/uploadPhotokContent-Disposition:Devizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                              • Avira URL Cloud: safe
                                                                                                                              unknown
                                                                                                                              http://api.twitter.com/1.1/trends/Devizni izvod za partiju 0050100073053.exefalse
                                                                                                                                high
                                                                                                                                http://api.twitter.com/1.1/statuses/retweets_of_me.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                                                                                  high
                                                                                                                                  http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.543192744.0000000006172000.00000004.00000001.sdmp, powershell.exe, 00000009.00000002.545169249.00000000055F3000.00000004.00000001.sdmpfalse
                                                                                                                                    high
                                                                                                                                    http://twic.li/api/uploadAudioLhttp://twic.li/api/uploadAudioAndTweet:http://twic.li/api/getContentDDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                                    • Avira URL Cloud: safe
                                                                                                                                    unknown
                                                                                                                                    http://twitter.com/statuses/retweeted_to_me.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                                                                                      high
                                                                                                                                      http://api.twitter.com/1.1/followers/ids.xmlDevizni izvod za partiju 0050100073053.exefalse
                                                                                                                                        high
                                                                                                                                        http://www.apache.org/licenses/LICENSE-2.0.htmlHpowershell.exe, 00000003.00000002.537074533.0000000005083000.00000004.00000001.sdmpfalse
                                                                                                                                          high
                                                                                                                                          http://api.twitter.com/1.1/statuses/update.xmljhttp://api.twitter.com/1.1/statuses/user_timeline.xmlDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            http://twic.li/api/uploadPhotoLhttp://twic.li/api/uploadPhotoAndTweetDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                                            • Avira URL Cloud: safe
                                                                                                                                            unknown
                                                                                                                                            http://api.twitter.com/1.1/statuses/retweets/id.xml_http://api.twitter.com/1.1/statuses/replies.xmlSDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              http://api.twitter.com/1.1/favorites.xmlXhttp://api.twitter.com/1.1/followers/ids.xmlThttp://api.twiDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                http://im.twitvid.com/api/uploadrhttp://api.twitter.com/1.1/account/verify_credentials.xmljhttp://apDevizni izvod za partiju 0050100073053.exe, 00000002.00000000.233483406.0000000000262000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000A.00000002.245256892.00000000002A2000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000C.00000000.246259331.0000000000432000.00000002.00020000.sdmp, Devizni izvod za partiju 0050100073053.exe, 0000000D.00000000.247851336.0000000000582000.00000002.00020000.sdmpfalse
                                                                                                                                                • Avira URL Cloud: safe
                                                                                                                                                unknown
                                                                                                                                                http://search.twitter.com/trends.jsonDevizni izvod za partiju 0050100073053.exefalse
                                                                                                                                                  high

                                                                                                                                                  Contacted IPs

                                                                                                                                                  • No. of IPs < 25%
                                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                                  • 75% < No. of IPs

                                                                                                                                                  Public

                                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                  79.134.225.71
                                                                                                                                                  emedoo.ddns.netSwitzerland
                                                                                                                                                  6775FINK-TELECOM-SERVICESCHtrue

                                                                                                                                                  Private

                                                                                                                                                  IP
                                                                                                                                                  192.168.2.1

                                                                                                                                                  General Information

                                                                                                                                                  Joe Sandbox Version:32.0.0 Black Diamond
                                                                                                                                                  Analysis ID:411771
                                                                                                                                                  Start date:12.05.2021
                                                                                                                                                  Start time:06:29:53
                                                                                                                                                  Joe Sandbox Product:CloudBasic
                                                                                                                                                  Overall analysis duration:0h 16m 2s
                                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                                  Report type:light
                                                                                                                                                  Sample file name:Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                  Cookbook file name:default.jbs
                                                                                                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                  Number of analysed new started processes analysed:39
                                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                                  Number of injected processes analysed:0
                                                                                                                                                  Technologies:
                                                                                                                                                  • HCA enabled
                                                                                                                                                  • EGA enabled
                                                                                                                                                  • HDC enabled
                                                                                                                                                  • AMSI enabled
                                                                                                                                                  Analysis Mode:default
                                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                                  Detection:MAL
                                                                                                                                                  Classification:mal100.troj.evad.winEXE@35/31@9/2
                                                                                                                                                  EGA Information:Failed
                                                                                                                                                  HDC Information:
                                                                                                                                                  • Successful, ratio: 0.2% (good quality ratio 0.2%)
                                                                                                                                                  • Quality average: 64.8%
                                                                                                                                                  • Quality standard deviation: 32.4%
                                                                                                                                                  HCA Information:
                                                                                                                                                  • Successful, ratio: 97%
                                                                                                                                                  • Number of executed functions: 0
                                                                                                                                                  • Number of non-executed functions: 0
                                                                                                                                                  Cookbook Comments:
                                                                                                                                                  • Adjust boot time
                                                                                                                                                  • Enable AMSI
                                                                                                                                                  • Found application associated with file extension: .exe
                                                                                                                                                  Warnings:
                                                                                                                                                  Show All
                                                                                                                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                                                                  • TCP Packets have been reduced to 100
                                                                                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                                                                                                                                  Simulations

                                                                                                                                                  Behavior and APIs

                                                                                                                                                  TimeTypeDescription
                                                                                                                                                  06:30:44API Interceptor355x Sleep call for process: Devizni izvod za partiju 0050100073053.exe modified
                                                                                                                                                  06:30:58AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                  06:31:09API Interceptor1x Sleep call for process: dhcpmon.exe modified
                                                                                                                                                  06:31:44API Interceptor185x Sleep call for process: powershell.exe modified

                                                                                                                                                  Joe Sandbox View / Context

                                                                                                                                                  IPs

                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                  79.134.225.71QwUl4FaToe.exeGet hashmaliciousBrowse
                                                                                                                                                    SCAN ORDER DOC 040202021.exeGet hashmaliciousBrowse
                                                                                                                                                      gfcYixSdyD.exeGet hashmaliciousBrowse
                                                                                                                                                        WxTm2cWLHF.exeGet hashmaliciousBrowse
                                                                                                                                                          uHAHxir7cFIdUqL.exeGet hashmaliciousBrowse
                                                                                                                                                            Wrcpl1dkib.exeGet hashmaliciousBrowse
                                                                                                                                                              PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                                                                                                                                PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                                                                                                                                  Swift-EUR 28700.exeGet hashmaliciousBrowse
                                                                                                                                                                    PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                                                                                                                                      PAYMENT NOTIFICATION.exeGet hashmaliciousBrowse
                                                                                                                                                                        PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                                                                                                                                          PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                                                                                                                                            PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                                                                                                                                              PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                                                                                                                                                fakture.exeGet hashmaliciousBrowse
                                                                                                                                                                                  BACK ORDER EXPORT0026254E_DOC_PDF.exeGet hashmaliciousBrowse
                                                                                                                                                                                    img_Payment Advice_822020_jpg.exeGet hashmaliciousBrowse
                                                                                                                                                                                      Bank Swift_7312020_PDF.exeGet hashmaliciousBrowse
                                                                                                                                                                                        LKVQYCZZkBgadMX.exeGet hashmaliciousBrowse

                                                                                                                                                                                          Domains

                                                                                                                                                                                          No context

                                                                                                                                                                                          ASN

                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                                                          FINK-TELECOM-SERVICESCHQwUl4FaToe.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.71
                                                                                                                                                                                          IMG_1035852_607.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.10
                                                                                                                                                                                          RFQEMFA.Elektrik.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.17
                                                                                                                                                                                          Waybill Document 22700456.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.7
                                                                                                                                                                                          Give Offer CVE6535 _TVOP-MIO, pdf.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.8
                                                                                                                                                                                          Waybill Document 22700456.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.7
                                                                                                                                                                                          RFQEMFA.Elektrik.pdf.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.17
                                                                                                                                                                                          w85rzxid7y.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.81
                                                                                                                                                                                          Remittance E-MAIL Layout - 10_.jarGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.106
                                                                                                                                                                                          s65eJyjKga.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.47
                                                                                                                                                                                          new order.xlsxGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.47
                                                                                                                                                                                          Ot3srIM10B.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.47
                                                                                                                                                                                          Remittance E-MAIL Layout - 10_.jarGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.106
                                                                                                                                                                                          wnQXyfONbS.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.82
                                                                                                                                                                                          kwK4iGa9DL.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.47
                                                                                                                                                                                          Remittance E-MAIL Layout - 10_.jarGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.106
                                                                                                                                                                                          4z9Saf2vu3.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.47
                                                                                                                                                                                          NewOrderSupplypdf.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.52
                                                                                                                                                                                          Pu5UMH4fWK.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.14
                                                                                                                                                                                          Swift-Correction.exeGet hashmaliciousBrowse
                                                                                                                                                                                          • 79.134.225.19

                                                                                                                                                                                          JA3 Fingerprints

                                                                                                                                                                                          No context

                                                                                                                                                                                          Dropped Files

                                                                                                                                                                                          No context

                                                                                                                                                                                          Created / dropped Files

                                                                                                                                                                                          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):877568
                                                                                                                                                                                          Entropy (8bit):7.25401903162754
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24576:0lO/1fBDLs8i4Y77/21nEgEcJCHwpKCfLc:0s/1pRY77/Lnc8HwlLc
                                                                                                                                                                                          MD5:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          SHA1:D0DEF6E40E7858A1B8C46D46F24A6B29499C7C37
                                                                                                                                                                                          SHA-256:333B1AE9552E6A65AB7C4EDEE6677746E801EBED73294795B9057E17A0E284E6
                                                                                                                                                                                          SHA-512:A397E7DCEF69FBD15A51080CA4F6AC2A698C9B880D0773950BD7C7777DFC2C5436A084694A825A60CD638E0B637599EE2C9A08119709FF62BBB89374A92361DD
                                                                                                                                                                                          Malicious:true
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                                          • Antivirus: Metadefender, Detection: 24%, Browse
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 48%
                                                                                                                                                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P......`....... ... ...@....@.. ....................................@.................................0 ..O....@..`]........................................................................... ............... ..H............text........ ...................... ..`.rsrc...`]...@...^..................@..@.reloc...............b..............@..B................d ......H.......T}..TI......e........Y............................................( ...*&..(!....*.s"........s#........s$........s%........s&........*...0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*.0...........~....o*....+..*.0...........~....o+....+..*.0..<........~.....(,.....,!r...p.....(-...o....s/............~.....+..*.0...........~.....+..*".......*.0..&........(....r'..p~....o0...(1.....t#....+..*...0..&........(....r_..p~....o0...(1.....
                                                                                                                                                                                          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):26
                                                                                                                                                                                          Entropy (8bit):3.95006375643621
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:ggPYV:rPYV
                                                                                                                                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                                                                          Malicious:true
                                                                                                                                                                                          Preview: [ZoneTransfer]....ZoneId=0
                                                                                                                                                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Devizni izvod za partiju 0050100073053.exe.log
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:modified
                                                                                                                                                                                          Size (bytes):525
                                                                                                                                                                                          Entropy (8bit):5.2874233355119316
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                                                                                                                                                          MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                                                                                                                                                          SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                                                                                                                                                          SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                                                                                                                                                          SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                                                                                                                                                          Malicious:true
                                                                                                                                                                                          Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                                                                                                                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                                                                                                                                          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):525
                                                                                                                                                                                          Entropy (8bit):5.2874233355119316
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                                                                                                                                                          MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                                                                                                                                                          SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                                                                                                                                                          SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                                                                                                                                                          SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                                                                                                                                                          C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:data
                                                                                                                                                                                          Category:modified
                                                                                                                                                                                          Size (bytes):25168
                                                                                                                                                                                          Entropy (8bit):4.975582086060887
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:6BV3IpNBQkj2Lh4iUxQedNYotBV3IpNBQkj2Lh4iUxtaKdROdBLNZBYoI:6BV3CNBQkj2Lh4iUxvdNYotBV3CNBQkx
                                                                                                                                                                                          MD5:62E1AE94DE84ED9286704EBD6856A263
                                                                                                                                                                                          SHA1:4888C4CFAA74FA9BCD7339CBF760B1060314246B
                                                                                                                                                                                          SHA-256:9AC3E181F8EB940093EF7F212696338C30CD1407AF8ECB25610C39D6B00D4C43
                                                                                                                                                                                          SHA-512:E99B7BA733C622C675AA7944338E994EE0D941663D812D702D986F4C162C4BC40FA2C837C6C761598B826A8CB7157DFBDDC20932B41B3D637209B3333BEEEB37
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: PSMODULECACHE......<.e...Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........<.e...T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0nf01gm5.vvm.ps1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2br1q3bz.k2u.psm1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fgwq2vs1.fuu.ps1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kv2bxms5.otf.psm1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l1gqcsja.gw5.psm1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rhz4qu2t.ytv.psm1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_udy30vs2.d4j.psm1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2l21i0h.hu0.ps1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zm0bfdmr.3xj.ps1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zopv30bh.0qg.ps1
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:very short file (no magic)
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1
                                                                                                                                                                                          Entropy (8bit):0.0
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:U:U
                                                                                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 1
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\tmp2011.tmp
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1659
                                                                                                                                                                                          Entropy (8bit):5.181728169538348
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB1tn:cbhH7MlNQ8/rydbz9I3YODOLNdq3V
                                                                                                                                                                                          MD5:B27BCB69317043F17C0C452DBE3F9E4D
                                                                                                                                                                                          SHA1:EF1FC850D6C2E7D02760122EF4DA4E8F918138A5
                                                                                                                                                                                          SHA-256:1D46225432C74CBE4F42B1958FBEA7F1694B69FBFBE0F5FB9CB8043AB271554E
                                                                                                                                                                                          SHA-512:216D3A4B522AB72A40D6F72A2FDB022324E91F286F2247B4A61AC8471235BFFE5ED8C7E6AFEC4019FB2ACD4EE2C5146CC162D9DC2B891300BA79B0F911629E35
                                                                                                                                                                                          Malicious:true
                                                                                                                                                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\tmp864D.tmp
                                                                                                                                                                                          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1659
                                                                                                                                                                                          Entropy (8bit):5.181728169538348
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB1tn:cbhH7MlNQ8/rydbz9I3YODOLNdq3V
                                                                                                                                                                                          MD5:B27BCB69317043F17C0C452DBE3F9E4D
                                                                                                                                                                                          SHA1:EF1FC850D6C2E7D02760122EF4DA4E8F918138A5
                                                                                                                                                                                          SHA-256:1D46225432C74CBE4F42B1958FBEA7F1694B69FBFBE0F5FB9CB8043AB271554E
                                                                                                                                                                                          SHA-512:216D3A4B522AB72A40D6F72A2FDB022324E91F286F2247B4A61AC8471235BFFE5ED8C7E6AFEC4019FB2ACD4EE2C5146CC162D9DC2B891300BA79B0F911629E35
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                                                                                                                                                          C:\Users\user\AppData\Roaming\AGYVBigGPY.exe
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):877568
                                                                                                                                                                                          Entropy (8bit):7.25401903162754
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24576:0lO/1fBDLs8i4Y77/21nEgEcJCHwpKCfLc:0s/1pRY77/Lnc8HwlLc
                                                                                                                                                                                          MD5:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          SHA1:D0DEF6E40E7858A1B8C46D46F24A6B29499C7C37
                                                                                                                                                                                          SHA-256:333B1AE9552E6A65AB7C4EDEE6677746E801EBED73294795B9057E17A0E284E6
                                                                                                                                                                                          SHA-512:A397E7DCEF69FBD15A51080CA4F6AC2A698C9B880D0773950BD7C7777DFC2C5436A084694A825A60CD638E0B637599EE2C9A08119709FF62BBB89374A92361DD
                                                                                                                                                                                          Malicious:true
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                                          • Antivirus: Metadefender, Detection: 24%, Browse
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 48%
                                                                                                                                                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P......`....... ... ...@....@.. ....................................@.................................0 ..O....@..`]........................................................................... ............... ..H............text........ ...................... ..`.rsrc...`]...@...^..................@..@.reloc...............b..............@..B................d ......H.......T}..TI......e........Y............................................( ...*&..(!....*.s"........s#........s$........s%........s&........*...0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*.0...........~....o*....+..*.0...........~....o+....+..*.0..<........~.....(,.....,!r...p.....(-...o....s/............~.....+..*.0...........~.....+..*".......*.0..&........(....r'..p~....o0...(1.....t#....+..*...0..&........(....r_..p~....o0...(1.....
                                                                                                                                                                                          C:\Users\user\AppData\Roaming\AGYVBigGPY.exe:Zone.Identifier
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):26
                                                                                                                                                                                          Entropy (8bit):3.95006375643621
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:ggPYV:rPYV
                                                                                                                                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                                                                          Malicious:true
                                                                                                                                                                                          Preview: [ZoneTransfer]....ZoneId=0
                                                                                                                                                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:data
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1624
                                                                                                                                                                                          Entropy (8bit):7.024371743172393
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC08
                                                                                                                                                                                          MD5:0D79388CEC6619D612C2088173BB6741
                                                                                                                                                                                          SHA1:8A312E3198009C545D0CF3254572189D29A03EA7
                                                                                                                                                                                          SHA-256:D7D423B23D932E306F3CCB2F7A984B7036A042C007A43FD655C6B57B960BB8DF
                                                                                                                                                                                          SHA-512:53BB3E9263DFD746E7E8159466E220E6EC9D81E9D3F0E1D191E09CD511B7EB93B0BA65D13CE0C97C652ECD0F69BB991E6B1840F961BC65003C4DD7AA93EEDA13
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                                                                                                                                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:data
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8
                                                                                                                                                                                          Entropy (8bit):2.4056390622295662
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:tvj:tvj
                                                                                                                                                                                          MD5:02D5A593FEC6C4B98F90CCFF6ADD6E2C
                                                                                                                                                                                          SHA1:F544B4D3B3717558E22E2B082BDD5018DE8AE765
                                                                                                                                                                                          SHA-256:134D5CE17F0F33356C65007BB35715CC72F3A22E659E34F957212A7168BC1250
                                                                                                                                                                                          SHA-512:3FEF07C755A48CA95F7559BB90FBF6AA858E44DDDE1D25A75AEEAF459980F5C656A52DA4F05C6E7BA788940FA49CA958B73E2B120BD1D24A48B9B4B0E47BBA48
                                                                                                                                                                                          Malicious:true
                                                                                                                                                                                          Preview: ...*J..H
                                                                                                                                                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bak
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:data
                                                                                                                                                                                          Category:modified
                                                                                                                                                                                          Size (bytes):24
                                                                                                                                                                                          Entropy (8bit):4.501629167387823
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:9bzY6oRDIvYk:RzWDI3
                                                                                                                                                                                          MD5:ACD3FB4310417DC77FE06F15B0E353E6
                                                                                                                                                                                          SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
                                                                                                                                                                                          SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
                                                                                                                                                                                          SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 9iH...}Z.4..f..J".C;"a
                                                                                                                                                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:data
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):64
                                                                                                                                                                                          Entropy (8bit):5.320159765557392
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:9bzY6oRDIvYVsRLY6oRDT6P2bfVn1:RzWDIfRWDT621
                                                                                                                                                                                          MD5:BB0F9B9992809E733EFFF8B0E562CFD6
                                                                                                                                                                                          SHA1:F0BAB3CF73A04F5A689E6AFC764FEE9276992742
                                                                                                                                                                                          SHA-256:C48F04FE7525AA3A3F9540889883F649726233DE021724823720A59B4F37CEAC
                                                                                                                                                                                          SHA-512:AE4280AA460DC1C0301D458A3A443F6884A0BE37481737B2ADAFD72C33C55F09BED88ED239C91FE6F19CA137AC3CD7C9B8454C21D3F8E759687F701C8B3C7A16
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: 9iH...}Z.4..f..J".C;"a9iH...}Z.4..f.~a........~.~.......3.U.
                                                                                                                                                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File Type:data
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):426840
                                                                                                                                                                                          Entropy (8bit):7.999608491116724
                                                                                                                                                                                          Encrypted:true
                                                                                                                                                                                          SSDEEP:12288:zKf137EiDsTjevgA4p0V7njXuWSvdVU7V4OC0Rr:+134i2lp67i5d8+OCg
                                                                                                                                                                                          MD5:963D5E2C9C0008DFF05518B47C367A7F
                                                                                                                                                                                          SHA1:C183D601FABBC9AC8FBFA0A0937DECC677535E74
                                                                                                                                                                                          SHA-256:5EACF2974C9BB2C2E24CDC651C4840DD6F4B76A98F0E85E90279F1DBB2E6F3C0
                                                                                                                                                                                          SHA-512:0C04E1C1A13070D48728D9F7F300D9B26DEC6EC8875D8D3017EAD52B9EE5BDF9B651A7F0FCC537761212831107646ED72B8ED017E7477E600BC0137EF857AE2C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: ..g&jo...IPg...GM....R>i...o...I.>.&.r{....8...}...E....v.!7.u3e.. .....db...}.......".t(.xC9.cp.B....7...'.......%......w.^.._.......B.W%.<..i.0.{9.xS...5...)..w..$..C..?`F..u.5.T.X.w'Si..z.n{...Y!m...RA...xg....[7...z..9@.K.-...T..+.ACe....R....enO.....AoNMT.\^....}H&..4I...B.:..@..J...v..rI5..kP......2j....B..B.~.T..>.c..emW;Rn<9..[.r.o....R[....@=...:...L.g<.....I..%4[.G^.~.l'......v.p&.........+..S...9d/.{..H.`@.1..........f.\s...X.a.].<.h*...J4*...k.x....%3.......3.c..?%....>.!.}..)(.{...H...3..`'].Q.[sN..JX(.%pH....+......(...v.....H...3..8.a_..J..?4...y.N(..D.*h..g.jD..I...44Q?..N......oX.A......l...n?./..........$.!..;.^9"H........*...OkF....v.m_.e.v..f...."..bq{.....O.-....%R+...-..P.i..t5....2Z# ...#...,L..{..j..heT -=Z.P;...g.m)<owJ].J..../.p..8.u8.&..#.m9...j%..g&....g.x.I,....u.[....>./W...........*X...b*Z...ex.0..x.}.....Tb...[..H_M._.^N.d&...g._."@4N.pDs].GbT.......&p........Nw...%$=.....{..J.1....2....<E{..<!G..
                                                                                                                                                                                          C:\Users\user\Documents\20210512\PowerShell_transcript.284992.8sAzw+Dk.20210512063128.txt
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):692
                                                                                                                                                                                          Entropy (8bit):5.407987213876938
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:57DtSA6NeidZO3fBd25orRx2DOzzUjjIneSuxNHwNeWo9Pw6jewGxMKjX4CIymgH:BxSACdZOvBdaUx2DOXUWeSuJWQHjeTKy
                                                                                                                                                                                          MD5:3A634A38F704AF9AB4E9A667D92D3034
                                                                                                                                                                                          SHA1:222A8C4D9E823EC6B241850C7CCF2974C0E61AF1
                                                                                                                                                                                          SHA-256:E8B4E1ADB39E6C39FC0574DAF5EA61431B46E434BEF28A97198C5951C18C14E5
                                                                                                                                                                                          SHA-512:91B54D26D21D2E6C418D94A4C768B75D36A1175DAE771C0A0C252446E807E99BD60EE5BBEADBB4AB0444D1956DE71F51FB6C54905EB67C9EADEC058A0673DDDA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512063235..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 284992 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\AGYVBigGPY.exe..Process ID: 6644..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..
                                                                                                                                                                                          C:\Users\user\Documents\20210512\PowerShell_transcript.284992.9Vv_x1G2.20210512063125.txt
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):690
                                                                                                                                                                                          Entropy (8bit):5.387679237624884
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:57DtSA6N6AidZO3fBd25orRx2DOzzUjjIneSur+WoCdPw6jewGxMKjX4CIymgSsx:BxSABAidZOvBdaUx2DOXUWeSur+WJdHy
                                                                                                                                                                                          MD5:E259EFE2F9F722D8FAD8C2D100B4F7D8
                                                                                                                                                                                          SHA1:249522ECDC08701B1AE06169CF01ABD96A6298F0
                                                                                                                                                                                          SHA-256:3A0910F0E87A2AC0A3E168F00F39B1FA3AB1E24BA7FFCD715912DA0234BB013B
                                                                                                                                                                                          SHA-512:0B94AEADE994A348C75DB5F8CD4781BEC9539FACF0C76C151BE6DE1955CAAC559B6B48330BABF1D31ED956CB30B895BC8FC75E54A6124A0E843130986D684777
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512063243..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 284992 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe..Process ID: 4708..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..
                                                                                                                                                                                          C:\Users\user\Documents\20210512\PowerShell_transcript.284992.hO0k8c4M.20210512063049.txt
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):862
                                                                                                                                                                                          Entropy (8bit):5.358854555611145
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:BxSACydZOvBdaUx2DOXUWeSuJW8HjeTKKjX4CIym1ZJXguB:BZ8v6UoO+SP8qDYB1Z+g
                                                                                                                                                                                          MD5:5A7EAF9BC9B5A1A7857562076DDD9A27
                                                                                                                                                                                          SHA1:AF665A1EFAC71BAA8C9608C49E749232DA05547C
                                                                                                                                                                                          SHA-256:29F03B82610592E81B95EC8B388AD6D71C2B9628278B70EECA20969667923FEB
                                                                                                                                                                                          SHA-512:0B2BAA41EA3A6A42597EF0FAE72847ABF7350A899ABD17AA8E11AB3BFD406E9695FC4036B5051E6CEA42983B512632ED53BF4463140506D87DC008DB6BC9A42D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512063124..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 284992 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\AGYVBigGPY.exe..Process ID: 5876..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210512063125..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\AGYVBigGPY.exe..
                                                                                                                                                                                          C:\Users\user\Documents\20210512\PowerShell_transcript.284992.nr8pMLKJ.20210512063051.txt
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):862
                                                                                                                                                                                          Entropy (8bit):5.350964262311637
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:BxSA/dZOvBdaUx2DOXUWeSuJWrHjeTKKjX4CIym1ZJXjuB:BZqv6UoO+SPrqDYB1Z9g
                                                                                                                                                                                          MD5:D6F00C73EE917223FE91D980F9E04494
                                                                                                                                                                                          SHA1:2AF600781F3C4BB7BDBF700697F0B2446E563876
                                                                                                                                                                                          SHA-256:48600FFDE10974E8E7F26EC3886BC216AE8F25608E3FD1EB572B3BB3F0FE82D0
                                                                                                                                                                                          SHA-512:BB1714C33DD95C6215A85CA6BEE33D7EFE887592DDA183E0A1E6838D7484B72CAFDCDBBBF468B94649D8C854AFB941C3E2C3D4D296F7AA9BE327EF8D0CFD1109
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512063126..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 284992 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\AGYVBigGPY.exe..Process ID: 2104..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210512063126..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\AGYVBigGPY.exe..
                                                                                                                                                                                          C:\Users\user\Documents\20210512\PowerShell_transcript.284992.oeX3hsoM.20210512063048.txt
                                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2071
                                                                                                                                                                                          Entropy (8bit):5.327464690880742
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:BZFv6UoO+SjXO5ezqDYB1Z3jXO50hZDv6UoO+SjXO5ezqDYB1ZGqA:BZp6UNlOeqDo1ZLO2hZz6UNlOeqDo1Z4
                                                                                                                                                                                          MD5:A75C3AB8C2111C7C68CA9166B6B23C02
                                                                                                                                                                                          SHA1:EF6FB863969049D9A608059A22B6DE1C676F7370
                                                                                                                                                                                          SHA-256:F2835B9FF108B6C211CFC17B854E96141DBA2D96FDFEE3996DB69E78CBF59AA8
                                                                                                                                                                                          SHA-512:14037BB575607BEC1F6782A5065ACD4A203F22582514B9D5AC4C15D62770998D6B259BF520D2FCBD1ED82FC9A54B38D0BA04A994A428CE9E9C36C8E397D32040
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512063114..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 284992 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe..Process ID: 5488..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210512063115..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe..**********************..Command start time: 20210512063915..**********************..PS>Terminating

                                                                                                                                                                                          Static File Info

                                                                                                                                                                                          General

                                                                                                                                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                          Entropy (8bit):7.25401903162754
                                                                                                                                                                                          TrID:
                                                                                                                                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                                                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                                                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                                                                                                                                          File name:Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          File size:877568
                                                                                                                                                                                          MD5:50ab414be17f4e03bee8f9c5cee06335
                                                                                                                                                                                          SHA1:d0def6e40e7858a1b8c46d46f24a6b29499c7c37
                                                                                                                                                                                          SHA256:333b1ae9552e6a65ab7c4edee6677746e801ebed73294795b9057e17a0e284e6
                                                                                                                                                                                          SHA512:a397e7dcef69fbd15a51080ca4f6ac2a698c9b880d0773950bd7c7777dfc2c5436a084694a825a60cd638e0b637599ee2c9a08119709ff62bbb89374a92361dd
                                                                                                                                                                                          SSDEEP:24576:0lO/1fBDLs8i4Y77/21nEgEcJCHwpKCfLc:0s/1pRY77/Lnc8HwlLc
                                                                                                                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P......`....... ... ...@....@.. ....................................@................................

                                                                                                                                                                                          File Icon

                                                                                                                                                                                          Icon Hash:70d8ccd2d6ccf071

                                                                                                                                                                                          Static PE Info

                                                                                                                                                                                          General

                                                                                                                                                                                          Entrypoint:0x4a2082
                                                                                                                                                                                          Entrypoint Section:.text
                                                                                                                                                                                          Digitally signed:false
                                                                                                                                                                                          Imagebase:0x400000
                                                                                                                                                                                          Subsystem:windows gui
                                                                                                                                                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                                                                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                                                                                                          Time Stamp:0x6099070E [Mon May 10 10:12:30 2021 UTC]
                                                                                                                                                                                          TLS Callbacks:
                                                                                                                                                                                          CLR (.Net) Version:v2.0.50727
                                                                                                                                                                                          OS Version Major:4
                                                                                                                                                                                          OS Version Minor:0
                                                                                                                                                                                          File Version Major:4
                                                                                                                                                                                          File Version Minor:0
                                                                                                                                                                                          Subsystem Version Major:4
                                                                                                                                                                                          Subsystem Version Minor:0
                                                                                                                                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                                                                                                          Entrypoint Preview

                                                                                                                                                                                          Instruction
                                                                                                                                                                                          jmp dword ptr [00402000h]
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al
                                                                                                                                                                                          add byte ptr [eax], al

                                                                                                                                                                                          Data Directories

                                                                                                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa20300x4f.text
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xa40000x35d60.rsrc
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xda0000xc.reloc
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                                                                                                          Sections

                                                                                                                                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                          .text0x20000xa00880xa0200False0.821009282299data7.66159215719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                          .rsrc0xa40000x35d600x35e00False0.368324934745data5.19988984772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                          .reloc0xda0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                                                                                                          Resources

                                                                                                                                                                                          NameRVASizeTypeLanguageCountry
                                                                                                                                                                                          RT_ICON0xa42e00x94a9PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                          RT_ICON0xad78c0x4872PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                          RT_ICON0xb20000x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                                                                                                                                                                          RT_ICON0xc28280x94a8data
                                                                                                                                                                                          RT_ICON0xcbcd00x5488data
                                                                                                                                                                                          RT_ICON0xd11580x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 16318463, next used block 4294909696
                                                                                                                                                                                          RT_ICON0xd53800x25a8data
                                                                                                                                                                                          RT_ICON0xd79280x10a8data
                                                                                                                                                                                          RT_ICON0xd89d00x988data
                                                                                                                                                                                          RT_ICON0xd93580x468GLS_BINARY_LSB_FIRST
                                                                                                                                                                                          RT_GROUP_ICON0xd97c00x92data
                                                                                                                                                                                          RT_VERSION0xd98540x320data
                                                                                                                                                                                          RT_MANIFEST0xd9b740x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                                                                                                                          Imports

                                                                                                                                                                                          DLLImport
                                                                                                                                                                                          mscoree.dll_CorExeMain

                                                                                                                                                                                          Version Infos

                                                                                                                                                                                          DescriptionData
                                                                                                                                                                                          Translation0x0000 0x04b0
                                                                                                                                                                                          LegalCopyrightCopyright 2017
                                                                                                                                                                                          Assembly Version1.0.0.0
                                                                                                                                                                                          InternalNameFXAssembly.exe
                                                                                                                                                                                          FileVersion1.0.0.0
                                                                                                                                                                                          CompanyName
                                                                                                                                                                                          LegalTrademarks
                                                                                                                                                                                          Comments
                                                                                                                                                                                          ProductNameGeom3D
                                                                                                                                                                                          ProductVersion1.0.0.0
                                                                                                                                                                                          FileDescriptionGeometRi
                                                                                                                                                                                          OriginalFilenameFXAssembly.exe

                                                                                                                                                                                          Network Behavior

                                                                                                                                                                                          Snort IDS Alerts

                                                                                                                                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                                                                          05/12/21-06:30:58.816182TCP2025019ET TROJAN Possible NanoCore C2 60B497155230192.168.2.779.134.225.71
                                                                                                                                                                                          05/12/21-06:31:10.596014TCP2025019ET TROJAN Possible NanoCore C2 60B497205230192.168.2.779.134.225.71
                                                                                                                                                                                          05/12/21-06:31:25.018858TCP2025019ET TROJAN Possible NanoCore C2 60B497235230192.168.2.779.134.225.71
                                                                                                                                                                                          05/12/21-06:31:38.122656TCP2025019ET TROJAN Possible NanoCore C2 60B497255230192.168.2.779.134.225.71
                                                                                                                                                                                          05/12/21-06:32:01.720351TCP2025019ET TROJAN Possible NanoCore C2 60B497265230192.168.2.779.134.225.71
                                                                                                                                                                                          05/12/21-06:32:15.474221TCP2025019ET TROJAN Possible NanoCore C2 60B497275230192.168.2.779.134.225.71
                                                                                                                                                                                          05/12/21-06:32:26.930999TCP2025019ET TROJAN Possible NanoCore C2 60B497285230192.168.2.779.134.225.71
                                                                                                                                                                                          05/12/21-06:32:48.787980TCP2025019ET TROJAN Possible NanoCore C2 60B497305230192.168.2.779.134.225.71

                                                                                                                                                                                          Network Port Distribution

                                                                                                                                                                                          TCP Packets

                                                                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                          May 12, 2021 06:30:58.086821079 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:30:58.230679035 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:30:58.231053114 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:30:58.816181898 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:30:58.975986958 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:30:58.977135897 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:30:59.172842979 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:30:59.177062035 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:30:59.322546959 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:30:59.324124098 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:30:59.530989885 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:30:59.657485962 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:30:59.855797052 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:30:59.855914116 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.049459934 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.049767971 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.050853968 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.051115990 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.051256895 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.051403046 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.051767111 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.052685976 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.052742958 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.052867889 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.053277016 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.053433895 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.053596973 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.054292917 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.054467916 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.054598093 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.055284977 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.055593967 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.055622101 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.056200027 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.194266081 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.194540977 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.194603920 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.194674969 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.194694042 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.195782900 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.196319103 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.196455956 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.197699070 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.197850943 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.199152946 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.199263096 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.199323893 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.199448109 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.199470043 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.199474096 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.200005054 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.200119972 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.201483011 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.201638937 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.203311920 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.203594923 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.203903913 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.203922987 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.205699921 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.206407070 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.206943035 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.207770109 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.208364964 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.208719015 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.208739042 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.209036112 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.210536003 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.211755991 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.211779118 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.211838961 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.211843967 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.340907097 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.341697931 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.342142105 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.342258930 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.342504978 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.342662096 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.343385935 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.343470097 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.344639063 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.345073938 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.345360994 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.346088886 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.346431971 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.347409964 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.347713947 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.350450993 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.350615025 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.350811005 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.351110935 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.351134062 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.351718903 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.352113962 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.352211952 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.352830887 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.354094028 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.354219913 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.354240894 CEST52304971579.134.225.71192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:00.354324102 CEST497155230192.168.2.779.134.225.71
                                                                                                                                                                                          May 12, 2021 06:31:00.354338884 CEST497155230192.168.2.779.134.225.71

                                                                                                                                                                                          UDP Packets

                                                                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                          May 12, 2021 06:30:58.013586998 CEST5281653192.168.2.78.8.4.4
                                                                                                                                                                                          May 12, 2021 06:30:58.072453976 CEST53528168.8.4.4192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:10.105428934 CEST4995853192.168.2.78.8.4.4
                                                                                                                                                                                          May 12, 2021 06:31:10.165529966 CEST53499588.8.4.4192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:23.804364920 CEST5045253192.168.2.78.8.4.4
                                                                                                                                                                                          May 12, 2021 06:31:23.863307953 CEST53504528.8.4.4192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:37.596846104 CEST5973053192.168.2.78.8.4.4
                                                                                                                                                                                          May 12, 2021 06:31:37.656759024 CEST53597308.8.4.4192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:31:57.780992985 CEST5191953192.168.2.78.8.4.4
                                                                                                                                                                                          May 12, 2021 06:31:57.839382887 CEST53519198.8.4.4192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:32:13.039374113 CEST6429653192.168.2.78.8.4.4
                                                                                                                                                                                          May 12, 2021 06:32:13.099052906 CEST53642968.8.4.4192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:32:26.642617941 CEST5668053192.168.2.78.8.4.4
                                                                                                                                                                                          May 12, 2021 06:32:26.701777935 CEST53566808.8.4.4192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:32:37.803754091 CEST5882053192.168.2.78.8.4.4
                                                                                                                                                                                          May 12, 2021 06:32:37.860908031 CEST53588208.8.4.4192.168.2.7
                                                                                                                                                                                          May 12, 2021 06:32:48.533617973 CEST6098353192.168.2.78.8.4.4
                                                                                                                                                                                          May 12, 2021 06:32:48.590641975 CEST53609838.8.4.4192.168.2.7

                                                                                                                                                                                          DNS Queries

                                                                                                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                                                                                          May 12, 2021 06:30:58.013586998 CEST192.168.2.78.8.4.40x4092Standard query (0)emedoo.ddns.netA (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:31:10.105428934 CEST192.168.2.78.8.4.40x8a62Standard query (0)emedoo.ddns.netA (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:31:23.804364920 CEST192.168.2.78.8.4.40x70a9Standard query (0)emedoo.ddns.netA (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:31:37.596846104 CEST192.168.2.78.8.4.40x3e7aStandard query (0)emedoo.ddns.netA (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:31:57.780992985 CEST192.168.2.78.8.4.40x188fStandard query (0)emedoo.ddns.netA (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:32:13.039374113 CEST192.168.2.78.8.4.40xc160Standard query (0)emedoo.ddns.netA (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:32:26.642617941 CEST192.168.2.78.8.4.40xef36Standard query (0)emedoo.ddns.netA (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:32:37.803754091 CEST192.168.2.78.8.4.40x7e6eStandard query (0)emedoo.ddns.netA (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:32:48.533617973 CEST192.168.2.78.8.4.40xfb75Standard query (0)emedoo.ddns.netA (IP address)IN (0x0001)

                                                                                                                                                                                          DNS Answers

                                                                                                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                                                                                          May 12, 2021 06:30:58.072453976 CEST8.8.4.4192.168.2.70x4092No error (0)emedoo.ddns.net79.134.225.71A (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:31:10.165529966 CEST8.8.4.4192.168.2.70x8a62No error (0)emedoo.ddns.net79.134.225.71A (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:31:23.863307953 CEST8.8.4.4192.168.2.70x70a9No error (0)emedoo.ddns.net79.134.225.71A (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:31:37.656759024 CEST8.8.4.4192.168.2.70x3e7aNo error (0)emedoo.ddns.net79.134.225.71A (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:31:57.839382887 CEST8.8.4.4192.168.2.70x188fNo error (0)emedoo.ddns.net79.134.225.71A (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:32:13.099052906 CEST8.8.4.4192.168.2.70xc160No error (0)emedoo.ddns.net79.134.225.71A (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:32:26.701777935 CEST8.8.4.4192.168.2.70xef36No error (0)emedoo.ddns.net79.134.225.71A (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:32:37.860908031 CEST8.8.4.4192.168.2.70x7e6eNo error (0)emedoo.ddns.net79.134.225.71A (IP address)IN (0x0001)
                                                                                                                                                                                          May 12, 2021 06:32:48.590641975 CEST8.8.4.4192.168.2.70xfb75No error (0)emedoo.ddns.net79.134.225.71A (IP address)IN (0x0001)

                                                                                                                                                                                          Code Manipulations

                                                                                                                                                                                          Statistics

                                                                                                                                                                                          Behavior

                                                                                                                                                                                          Click to jump to process

                                                                                                                                                                                          System Behavior

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:43
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe'
                                                                                                                                                                                          Imagebase:0x260000
                                                                                                                                                                                          File size:877568 bytes
                                                                                                                                                                                          MD5 hash:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                                                                          Yara matches:
                                                                                                                                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000002.00000002.255288442.0000000002A3B000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.256690894.0000000003A11000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                          Reputation:low

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:45
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe'
                                                                                                                                                                                          Imagebase:0x1110000
                                                                                                                                                                                          File size:430592 bytes
                                                                                                                                                                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:46
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          Imagebase:0x7ff774ee0000
                                                                                                                                                                                          File size:625664 bytes
                                                                                                                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:46
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
                                                                                                                                                                                          Imagebase:0x1110000
                                                                                                                                                                                          File size:430592 bytes
                                                                                                                                                                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:46
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp2011.tmp'
                                                                                                                                                                                          Imagebase:0xbe0000
                                                                                                                                                                                          File size:185856 bytes
                                                                                                                                                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:46
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          Imagebase:0x7ff774ee0000
                                                                                                                                                                                          File size:625664 bytes
                                                                                                                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:47
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          Imagebase:0x7ff774ee0000
                                                                                                                                                                                          File size:625664 bytes
                                                                                                                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:47
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
                                                                                                                                                                                          Imagebase:0x1110000
                                                                                                                                                                                          File size:430592 bytes
                                                                                                                                                                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:48
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          Imagebase:0x2a0000
                                                                                                                                                                                          File size:877568 bytes
                                                                                                                                                                                          MD5 hash:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:low

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:48
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          Imagebase:0x7ff774ee0000
                                                                                                                                                                                          File size:625664 bytes
                                                                                                                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:49
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          Imagebase:0x430000
                                                                                                                                                                                          File size:877568 bytes
                                                                                                                                                                                          MD5 hash:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:low

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:30:50
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:C:\Users\user\Desktop\Devizni izvod za partiju 0050100073053.exe
                                                                                                                                                                                          Imagebase:0x580000
                                                                                                                                                                                          File size:877568 bytes
                                                                                                                                                                                          MD5 hash:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                                                                          Yara matches:
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 0000000D.00000003.296886935.0000000004040000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.541194418.0000000003D8D000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.546573646.00000000056B0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.552591050.0000000006A50000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.552591050.0000000006A50000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.546929623.0000000005950000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.546929623.0000000005950000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.503765658.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.546313038.00000000055C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.546313038.00000000055C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 0000000D.00000003.297630594.000000000410E000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.551440197.0000000006890000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.551440197.0000000006890000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.552438629.0000000006A20000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.552438629.0000000006A20000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.546995313.00000000059E0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.546995313.00000000059E0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.551688994.00000000068C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.551688994.00000000068C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000003.297298308.0000000004098000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 0000000D.00000003.297298308.0000000004098000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.551733160.00000000068D0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.551733160.00000000068D0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.551056353.0000000006730000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.551056353.0000000006730000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.547173286.0000000005A80000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.547173286.0000000005A80000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.546044032.0000000005580000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.546044032.0000000005580000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.546082364.0000000005590000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.546082364.0000000005590000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.535153965.0000000002D8C000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.545285946.00000000053A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.545285946.00000000053A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          Reputation:low

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:07
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                                                                                                                          Imagebase:0xeb0000
                                                                                                                                                                                          File size:877568 bytes
                                                                                                                                                                                          MD5 hash:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                                                                          Yara matches:
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.373412048.0000000004761000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000013.00000002.364891578.000000000378B000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.383604898.000000000525A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                          Antivirus matches:
                                                                                                                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                                                                                                                          • Detection: 24%, Metadefender, Browse
                                                                                                                                                                                          • Detection: 48%, ReversingLabs
                                                                                                                                                                                          Reputation:low

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:14
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                                                                                                                          Imagebase:0x1110000
                                                                                                                                                                                          File size:430592 bytes
                                                                                                                                                                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:15
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          Imagebase:0x7ff774ee0000
                                                                                                                                                                                          File size:625664 bytes
                                                                                                                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:15
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AGYVBigGPY' /XML 'C:\Users\user\AppData\Local\Temp\tmp864D.tmp'
                                                                                                                                                                                          Imagebase:0xd90000
                                                                                                                                                                                          File size:185856 bytes
                                                                                                                                                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:high

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:15
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          Imagebase:0x7ff774ee0000
                                                                                                                                                                                          File size:625664 bytes
                                                                                                                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:17
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\AGYVBigGPY.exe'
                                                                                                                                                                                          Imagebase:0x1110000
                                                                                                                                                                                          File size:430592 bytes
                                                                                                                                                                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:.Net C# or VB.NET

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:18
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          Imagebase:0x7ff774ee0000
                                                                                                                                                                                          File size:625664 bytes
                                                                                                                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:18
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          Imagebase:0x140000
                                                                                                                                                                                          File size:877568 bytes
                                                                                                                                                                                          MD5 hash:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:23
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          Imagebase:0x3c0000
                                                                                                                                                                                          File size:877568 bytes
                                                                                                                                                                                          MD5 hash:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                                                                                          General

                                                                                                                                                                                          Start time:06:31:26
                                                                                                                                                                                          Start date:12/05/2021
                                                                                                                                                                                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                          Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                                                                                          Imagebase:0x600000
                                                                                                                                                                                          File size:877568 bytes
                                                                                                                                                                                          MD5 hash:50AB414BE17F4E03BEE8F9C5CEE06335
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:.Net C# or VB.NET
                                                                                                                                                                                          Yara matches:
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000002.383744500.0000000003EC1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 00000022.00000002.383744500.0000000003EC1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                                                                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                                                                          • Rule: NanoCore, Description: unknown, Source: 00000022.00000002.357286802.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                                                                                                                                                          Disassembly

                                                                                                                                                                                          Code Analysis

                                                                                                                                                                                          Reset < >