Loading ...

Play interactive tourEdit tour

Analysis Report dYy3yfSkwY.exe

Overview

General Information

Sample Name:dYy3yfSkwY.exe
Analysis ID:432605
MD5:3deb8b7e51c21cba0c2c723c5af953dd
SHA1:f98809b1b883912d278f7eaf64d7eedfaee1ef5a
SHA256:c0503f7c65391a5be8030bbaaf6c17260fa67e40a3fcc23b84c26610c266008b
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • dYy3yfSkwY.exe (PID: 6108 cmdline: 'C:\Users\user\Desktop\dYy3yfSkwY.exe' MD5: 3DEB8B7E51C21CBA0C2C723C5AF953DD)
    • dYy3yfSkwY.exe (PID: 668 cmdline: 'C:\Users\user\Desktop\dYy3yfSkwY.exe' MD5: 3DEB8B7E51C21CBA0C2C723C5AF953DD)
  • opjlpsercy.exe (PID: 3724 cmdline: 'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe' MD5: 3DEB8B7E51C21CBA0C2C723C5AF953DD)
    • opjlpsercy.exe (PID: 4520 cmdline: 'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe' MD5: 3DEB8B7E51C21CBA0C2C723C5AF953DD)
  • opjlpsercy.exe (PID: 5892 cmdline: 'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe' MD5: 3DEB8B7E51C21CBA0C2C723C5AF953DD)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "4614bd42-26c0-4da0-8e09-16890d37", "Group": "Default", "Domain1": "wekeepworking.sytes.net", "Domain2": "wekeepworking12.sytes.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x251e5:$x1: NanoCore.ClientPluginHost
  • 0x25222:$x2: IClientNetworkHost
  • 0x28d55:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x24f4d:$a: NanoCore
    • 0x24f5d:$a: NanoCore
    • 0x25191:$a: NanoCore
    • 0x251a5:$a: NanoCore
    • 0x251e5:$a: NanoCore
    • 0x24fac:$b: ClientPlugin
    • 0x251ae:$b: ClientPlugin
    • 0x251ee:$b: ClientPlugin
    • 0x250d3:$c: ProjectData
    • 0x25ada:$d: DESCrypto
    • 0x2d4a6:$e: KeepAlive
    • 0x2b494:$g: LogClientMessage
    • 0x2768f:$i: get_Connected
    • 0x25e10:$j: #=q
    • 0x25e40:$j: #=q
    • 0x25e5c:$j: #=q
    • 0x25e8c:$j: #=q
    • 0x25ea8:$j: #=q
    • 0x25ec4:$j: #=q
    • 0x25ef4:$j: #=q
    • 0x25f10:$j: #=q
    0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x139f05:$a: NanoCore
      • 0x139f5e:$a: NanoCore
      • 0x139f9b:$a: NanoCore
      • 0x13a014:$a: NanoCore
      • 0x142ae8:$a: NanoCore
      • 0x142b0d:$a: NanoCore
      • 0x142b66:$a: NanoCore
      • 0x152d03:$a: NanoCore
      • 0x152d29:$a: NanoCore
      • 0x152d85:$a: NanoCore
      • 0x15fbda:$a: NanoCore
      • 0x15fc33:$a: NanoCore
      • 0x15fc66:$a: NanoCore
      • 0x15fe92:$a: NanoCore
      • 0x15ff0e:$a: NanoCore
      • 0x160527:$a: NanoCore
      • 0x160670:$a: NanoCore
      • 0x160b44:$a: NanoCore
      • 0x160e2b:$a: NanoCore
      • 0x160e42:$a: NanoCore
      • 0x1663e0:$a: NanoCore
      Click to see the 38 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      11.2.opjlpsercy.exe.3ab7184.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x6da5:$x1: NanoCore.ClientPluginHost
      • 0x6dd2:$x2: IClientNetworkHost
      11.2.opjlpsercy.exe.3ab7184.8.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x6da5:$x2: NanoCore.ClientPluginHost
      • 0x7d74:$s2: FileCommand
      • 0xc776:$s4: PipeCreated
      • 0x6dbf:$s5: IClientLoggingHost
      11.2.opjlpsercy.exe.290b950.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x2dbb:$x1: NanoCore.ClientPluginHost
      • 0x2de5:$x2: IClientNetworkHost
      11.2.opjlpsercy.exe.290b950.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x2dbb:$x2: NanoCore.ClientPluginHost
      • 0x4c6b:$s4: PipeCreated
      7.2.opjlpsercy.exe.9810000.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x215e5:$x1: NanoCore.ClientPluginHost
      • 0x21622:$x2: IClientNetworkHost
      • 0x25155:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 105 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\dYy3yfSkwY.exe, ProcessId: 668, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\dYy3yfSkwY.exe, ProcessId: 668, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\dYy3yfSkwY.exe, ProcessId: 668, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\dYy3yfSkwY.exe, ProcessId: 668, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "4614bd42-26c0-4da0-8e09-16890d37", "Group": "Default", "Domain1": "wekeepworking.sytes.net", "Domain2": "wekeepworking12.sytes.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Multi AV Scanner detection for domain / URLShow sources
      Source: wekeepworking.sytes.netVirustotal: Detection: 7%Perma Link
      Source: wekeepworking.sytes.netVirustotal: Detection: 7%Perma Link
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeReversingLabs: Detection: 34%
      Multi AV Scanner detection for submitted fileShow sources
      Source: dYy3yfSkwY.exeVirustotal: Detection: 19%Perma Link
      Source: dYy3yfSkwY.exeReversingLabs: Detection: 34%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: opjlpsercy.exe PID: 3724, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: opjlpsercy.exe PID: 4520, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: dYy3yfSkwY.exe PID: 668, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: dYy3yfSkwY.exe PID: 6108, type: MEMORY
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9810000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4a70000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9821458.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4a70000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3ab7184.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2180000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.38e3258.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2180000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3aa6126.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9810000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.38e3258.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9821458.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2191458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4b00000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3aaaf52.6.raw.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: dYy3yfSkwY.exeJoe Sandbox ML: detected
      Source: 0.2.dYy3yfSkwY.exe.9920000.6.unpackAvira: Label: TR/Patched.Ren.Gen
      Source: 11.2.opjlpsercy.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.2.opjlpsercy.exe.40ff3e.2.unpackAvira: Label: ADWARE/Patched.Ren.Gen7
      Source: 11.1.opjlpsercy.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 0.2.dYy3yfSkwY.exe.40ff3e.2.unpackAvira: Label: ADWARE/Patched.Ren.Gen7
      Source: 3.1.dYy3yfSkwY.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7

      Compliance:

      barindex
      Detected unpacking (overwrites its own PE header)Show sources
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeUnpacked PE file: 11.2.opjlpsercy.exe.400000.0.unpack
      Source: dYy3yfSkwY.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Binary string: wntdll.pdbUGP source: dYy3yfSkwY.exe, 00000000.00000003.246656563.0000000009D50000.00000004.00000001.sdmp, opjlpsercy.exe, 00000007.00000003.296059729.0000000009A40000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: dYy3yfSkwY.exe, 00000000.00000003.246656563.0000000009D50000.00000004.00000001.sdmp, opjlpsercy.exe, 00000007.00000003.296059729.0000000009A40000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb` source: dYy3yfSkwY.exe, 00000003.00000003.314381355.00000000059AD000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_0040263E FindFirstFileA,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_1_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 14_2_00405E61 FindFirstFileA,FindClose,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 14_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 14_2_0040263E FindFirstFileA,

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: wekeepworking.sytes.net
      Source: Malware configuration extractorURLs: wekeepworking12.sytes.net
      Source: global trafficTCP traffic: 192.168.2.7:49722 -> 79.134.225.90:1144
      Source: Joe Sandbox ViewIP Address: 79.134.225.90 79.134.225.90
      Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
      Source: unknownDNS traffic detected: queries for: wekeepworking.sytes.net
      Source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmpString found in binary or memory: http://google.com
      Source: opjlpsercy.exe, opjlpsercy.exe, 0000000E.00000002.498586317.0000000000409000.00000004.00020000.sdmp, dYy3yfSkwY.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: dYy3yfSkwY.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00405042 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,
      Source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: opjlpsercy.exe PID: 3724, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: opjlpsercy.exe PID: 4520, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: dYy3yfSkwY.exe PID: 668, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: dYy3yfSkwY.exe PID: 6108, type: MEMORY
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9810000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4a70000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9821458.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4a70000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3ab7184.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2180000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.38e3258.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2180000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3aa6126.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9810000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.38e3258.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9821458.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2191458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4b00000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3aaaf52.6.raw.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.319549745.00000000028EE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: opjlpsercy.exe PID: 3724, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: opjlpsercy.exe PID: 3724, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: opjlpsercy.exe PID: 4520, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: opjlpsercy.exe PID: 4520, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: dYy3yfSkwY.exe PID: 668, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: dYy3yfSkwY.exe PID: 668, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: dYy3yfSkwY.exe PID: 6108, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: dYy3yfSkwY.exe PID: 6108, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.3ab7184.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.290b950.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.opjlpsercy.exe.9810000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.opjlpsercy.exe.9810000.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.4a70000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.4a70000.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.opjlpsercy.exe.9821458.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.opjlpsercy.exe.9821458.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.4a70000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.4a70000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.1.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.1.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.3ab7184.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.3ab7184.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.dYy3yfSkwY.exe.2180000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.1.dYy3yfSkwY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.dYy3yfSkwY.exe.2180000.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.1.dYy3yfSkwY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.1.dYy3yfSkwY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.1.dYy3yfSkwY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.38e3258.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.38e3258.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.dYy3yfSkwY.exe.2180000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.dYy3yfSkwY.exe.2180000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.29068e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.29068e8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.1.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.1.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.3aa6126.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.3aa6126.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.2917c24.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.3aaaf52.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.opjlpsercy.exe.9810000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.opjlpsercy.exe.9810000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.1.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.1.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.38e3258.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.38e3258.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.opjlpsercy.exe.9821458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.opjlpsercy.exe.9821458.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.1.dYy3yfSkwY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.1.dYy3yfSkwY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.290b950.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.290b950.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.2917c24.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.2917c24.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 11.2.opjlpsercy.exe.3aaaf52.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 11.2.opjlpsercy.exe.3aaaf52.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_0040323C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 14_2_0040323C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00404853
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00406131
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_72C01A98
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_0040A2A5
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 7_2_6D991A98
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_0040A2A5
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_024623A0
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_02462FA8
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_0246306F
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_1_0040A2A5
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 14_2_00404853
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 14_2_00406131
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: String function: 00401ED0 appears 46 times
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: String function: 0040569E appears 36 times
      Source: dYy3yfSkwY.exe, 00000000.00000003.250569725.0000000009F0F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs dYy3yfSkwY.exe
      Source: dYy3yfSkwY.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.319549745.00000000028EE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: opjlpsercy.exe PID: 3724, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: opjlpsercy.exe PID: 3724, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: opjlpsercy.exe PID: 4520, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: opjlpsercy.exe PID: 4520, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: dYy3yfSkwY.exe PID: 668, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: dYy3yfSkwY.exe PID: 668, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: dYy3yfSkwY.exe PID: 6108, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: dYy3yfSkwY.exe PID: 6108, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.3ab7184.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.3ab7184.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.290b950.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.290b950.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.opjlpsercy.exe.9810000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.opjlpsercy.exe.9810000.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.4a70000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.4a70000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.4a70000.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.opjlpsercy.exe.9821458.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.opjlpsercy.exe.9821458.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.opjlpsercy.exe.9821458.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.4a70000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.4a70000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.4a70000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.1.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.1.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.1.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.3ab7184.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.3ab7184.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.dYy3yfSkwY.exe.2180000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.1.dYy3yfSkwY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.1.dYy3yfSkwY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.dYy3yfSkwY.exe.2180000.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.1.dYy3yfSkwY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.1.dYy3yfSkwY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.1.dYy3yfSkwY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 3.1.dYy3yfSkwY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.38e3258.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.38e3258.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.38e3258.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.dYy3yfSkwY.exe.2180000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.dYy3yfSkwY.exe.2180000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.29068e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.29068e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.29068e8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.1.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.1.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.1.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.3aa6126.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.3aa6126.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.2917c24.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.2917c24.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.3aaaf52.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.3aaaf52.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.opjlpsercy.exe.9810000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.opjlpsercy.exe.9810000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.1.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.1.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.38e3258.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.38e3258.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.38e3258.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.opjlpsercy.exe.9821458.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.opjlpsercy.exe.9821458.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.opjlpsercy.exe.9821458.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.1.dYy3yfSkwY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.1.dYy3yfSkwY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.290b950.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.290b950.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.290b950.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.dYy3yfSkwY.exe.2191458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.2917c24.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.2917c24.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.2917c24.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.3aaaf52.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 11.2.opjlpsercy.exe.3aaaf52.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: classification engineClassification label: mal100.troj.evad.winEXE@7/13@58/1
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00404356 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile created: C:\Users\user\AppData\Roaming\monsuyajoJump to behavior
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{4614bd42-26c0-4da0-8e09-16890d37c1d7}
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsz21ED.tmpJump to behavior
      Source: dYy3yfSkwY.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: dYy3yfSkwY.exeVirustotal: Detection: 19%
      Source: dYy3yfSkwY.exeReversingLabs: Detection: 34%
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile read: C:\Users\user\Desktop\dYy3yfSkwY.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\dYy3yfSkwY.exe 'C:\Users\user\Desktop\dYy3yfSkwY.exe'
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess created: C:\Users\user\Desktop\dYy3yfSkwY.exe 'C:\Users\user\Desktop\dYy3yfSkwY.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe 'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe'
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess created: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe 'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe 'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe'
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess created: C:\Users\user\Desktop\dYy3yfSkwY.exe 'C:\Users\user\Desktop\dYy3yfSkwY.exe'
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess created: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe 'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe'
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Binary string: wntdll.pdbUGP source: dYy3yfSkwY.exe, 00000000.00000003.246656563.0000000009D50000.00000004.00000001.sdmp, opjlpsercy.exe, 00000007.00000003.296059729.0000000009A40000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: dYy3yfSkwY.exe, 00000000.00000003.246656563.0000000009D50000.00000004.00000001.sdmp, opjlpsercy.exe, 00000007.00000003.296059729.0000000009A40000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp
      Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb` source: dYy3yfSkwY.exe, 00000003.00000003.314381355.00000000059AD000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp

      Data Obfuscation:

      barindex
      Detected unpacking (changes PE section rights)Show sources
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeUnpacked PE file: 11.2.opjlpsercy.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.gfids:R;.rsrc:R;
      Detected unpacking (overwrites its own PE header)Show sources
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeUnpacked PE file: 11.2.opjlpsercy.exe.400000.0.unpack
      .NET source code contains potential unpackerShow sources
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_72C02F60 push eax; ret
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_00401F16 push ecx; ret
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 7_2_6D992F60 push eax; ret
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_00401F16 push ecx; ret
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_1_00401F16 push ecx; ret
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 11.2.opjlpsercy.exe.4b00000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile created: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeJump to dropped file
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeFile created: C:\Users\user\AppData\Local\Temp\nso6CF2.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile created: C:\Users\user\AppData\Local\Temp\nsz21EF.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ppeejliapuJump to behavior
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ppeejliapuJump to behavior

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeFile opened: C:\Users\user\Desktop\dYy3yfSkwY.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeWindow / User API: foregroundWindowGot 466
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeWindow / User API: foregroundWindowGot 523
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exe TID: 5000Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exe TID: 4772Thread sleep time: -620000s >= -30000s
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe TID: 4352Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe TID: 6376Thread sleep count: 37 > 30
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe TID: 6364Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_0040263E FindFirstFileA,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_1_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 14_2_00405E61 FindFirstFileA,FindClose,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 14_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 14_2_0040263E FindFirstFileA,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeThread delayed: delay time: 30000
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_004035F1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_004035F1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_1_004035F1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_004067FE GetProcessHeap,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_00401E1D SetUnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_00401E1D SetUnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_1_00401E1D SetUnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_1_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeCode function: 11_1_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Maps a DLL or memory area into another processShow sources
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeSection loaded: unknown target: C:\Users\user\Desktop\dYy3yfSkwY.exe protection: execute and read and write
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeSection loaded: unknown target: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe protection: execute and read and write
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeProcess created: C:\Users\user\Desktop\dYy3yfSkwY.exe 'C:\Users\user\Desktop\dYy3yfSkwY.exe'
      Source: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exeProcess created: C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe 'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe'
      Source: opjlpsercy.exe, 0000000E.00000002.500745713.0000000000DB0000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
      Source: dYy3yfSkwY.exe, 00000003.00000003.335200967.0000000005983000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: opjlpsercy.exe, 0000000E.00000002.500745713.0000000000DB0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: opjlpsercy.exe, 0000000E.00000002.500745713.0000000000DB0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: dYy3yfSkwY.exe, 00000003.00000003.344875253.000000000073C000.00000004.00000001.sdmpBinary or memory string: Program Managerknown.
      Source: opjlpsercy.exe, 0000000E.00000002.500745713.0000000000DB0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_0040208D cpuid
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 3_1_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeCode function: 0_2_00405B88 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,StrCmpNIW,lstrlenA,
      Source: C:\Users\user\Desktop\dYy3yfSkwY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: opjlpsercy.exe PID: 3724, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: opjlpsercy.exe PID: 4520, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: dYy3yfSkwY.exe PID: 668, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: dYy3yfSkwY.exe PID: 6108, type: MEMORY
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9810000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4a70000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9821458.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4a70000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3ab7184.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2180000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.38e3258.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2180000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3aa6126.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9810000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.38e3258.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9821458.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2191458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4b00000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3aaaf52.6.raw.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: dYy3yfSkwY.exe, 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dYy3yfSkwY.exeString found in binary or memory: NanoCore.ClientPluginHost
      Source: opjlpsercy.exe, 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: opjlpsercy.exeString found in binary or memory: NanoCore.ClientPluginHost
      Source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: opjlpsercy.exe, 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: opjlpsercy.exe PID: 3724, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: opjlpsercy.exe PID: 4520, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: dYy3yfSkwY.exe PID: 668, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: dYy3yfSkwY.exe PID: 6108, type: MEMORY
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9810000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4a70000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9821458.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4a70000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2191458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3ab7184.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2180000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.38e3258.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2180000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3aa6126.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9810000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.1.opjlpsercy.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.38e3258.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.opjlpsercy.exe.9821458.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.1.dYy3yfSkwY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.dYy3yfSkwY.exe.2191458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.4b00000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 11.2.opjlpsercy.exe.3aaaf52.6.raw.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsNative API1Registry Run Keys / Startup Folder1Process Injection112Disable or Modify Tools1Input Capture11System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Deobfuscate/Decode Files or Information11LSASS MemoryFile and Directory Discovery2Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery15SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing31NTDSSecurity Software Discovery13Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion31Cached Domain CredentialsVirtualization/Sandbox Evasion31VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 432605 Sample: dYy3yfSkwY.exe Startdate: 10/06/2021 Architecture: WINDOWS Score: 100 32 wekeepworking12.sytes.net 2->32 34 wekeepworking.sytes.net 2->34 40 Multi AV Scanner detection for domain / URL 2->40 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 7 other signatures 2->46 7 opjlpsercy.exe 18 2->7         started        11 dYy3yfSkwY.exe 1 22 2->11         started        13 opjlpsercy.exe 16 2->13         started        signatures3 process4 file5 22 C:\Users\user\AppData\Local\...\System.dll, PE32 7->22 dropped 50 Multi AV Scanner detection for dropped file 7->50 52 Detected unpacking (changes PE section rights) 7->52 54 Detected unpacking (overwrites its own PE header) 7->54 56 Machine Learning detection for dropped file 7->56 15 opjlpsercy.exe 3 7->15         started        24 C:\Users\user\AppData\...\opjlpsercy.exe, PE32 11->24 dropped 26 C:\Users\user\AppData\Local\...\System.dll, PE32 11->26 dropped 58 Maps a DLL or memory area into another process 11->58 18 dYy3yfSkwY.exe 8 11->18         started        signatures6 process7 dnsIp8 28 C:\Users\user\AppData\...\opjlpsercy.exe.log, ASCII 15->28 dropped 36 wekeepworking.sytes.net 79.134.225.90, 1144, 49722, 49726 FINK-TELECOM-SERVICESCH Switzerland 18->36 38 wekeepworking12.sytes.net 18->38 30 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 18->30 dropped 48 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->48 file9 signatures10

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      dYy3yfSkwY.exe19%VirustotalBrowse
      dYy3yfSkwY.exe35%ReversingLabsWin32.Trojan.NanoBot
      dYy3yfSkwY.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\nso6CF2.tmp\System.dll0%MetadefenderBrowse
      C:\Users\user\AppData\Local\Temp\nso6CF2.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsz21EF.tmp\System.dll0%MetadefenderBrowse
      C:\Users\user\AppData\Local\Temp\nsz21EF.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe35%ReversingLabsWin32.Trojan.NanoBot

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      0.2.dYy3yfSkwY.exe.9920000.6.unpack100%AviraTR/Patched.Ren.GenDownload File
      7.0.opjlpsercy.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
      11.0.opjlpsercy.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
      11.2.opjlpsercy.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      0.2.dYy3yfSkwY.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
      14.0.opjlpsercy.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
      0.0.dYy3yfSkwY.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
      7.2.opjlpsercy.exe.40ff3e.2.unpack100%AviraADWARE/Patched.Ren.Gen7Download File
      7.2.opjlpsercy.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
      11.1.opjlpsercy.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      0.2.dYy3yfSkwY.exe.40ff3e.2.unpack100%AviraADWARE/Patched.Ren.Gen7Download File
      3.1.dYy3yfSkwY.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      11.2.opjlpsercy.exe.4b00000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      14.2.opjlpsercy.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
      3.0.dYy3yfSkwY.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File

      Domains

      SourceDetectionScannerLabelLink
      wekeepworking.sytes.net8%VirustotalBrowse
      wekeepworking12.sytes.net2%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      wekeepworking.sytes.net8%VirustotalBrowse
      wekeepworking.sytes.net0%Avira URL Cloudsafe
      wekeepworking12.sytes.net0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      wekeepworking.sytes.net
      79.134.225.90
      truetrueunknown
      wekeepworking12.sytes.net
      unknown
      unknowntrueunknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      wekeepworking.sytes.nettrue
      • 8%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      wekeepworking12.sytes.nettrue
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_Erroropjlpsercy.exe, opjlpsercy.exe, 0000000E.00000002.498586317.0000000000409000.00000004.00020000.sdmp, dYy3yfSkwY.exefalse
        high
        http://nsis.sf.net/NSIS_ErrorErrordYy3yfSkwY.exefalse
          high

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          79.134.225.90
          wekeepworking.sytes.netSwitzerland
          6775FINK-TELECOM-SERVICESCHtrue

          General Information

          Joe Sandbox Version:32.0.0 Black Diamond
          Analysis ID:432605
          Start date:10.06.2021
          Start time:15:30:25
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 10m 51s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:dYy3yfSkwY.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:29
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@7/13@58/1
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 77.4% (good quality ratio 72.2%)
          • Quality average: 79.4%
          • Quality standard deviation: 29.9%
          HCA Information:
          • Successful, ratio: 80%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
          • Excluded IPs from analysis (whitelisted): 51.103.5.159, 13.88.21.125, 204.79.197.200, 13.107.21.200, 23.211.6.115, 52.255.188.83, 13.64.90.137, 184.30.24.56, 20.82.210.154, 8.238.36.254, 8.238.85.254, 8.241.78.126, 8.238.30.126, 8.238.85.126, 51.103.5.186, 92.122.213.194, 92.122.213.247, 20.72.88.19, 20.75.105.140, 20.54.26.129, 20.49.157.6
          • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, eus2-consumerrp-displaycatalog-aks2aks-useast.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, client.wns.windows.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          15:31:26AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ppeejliapu C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
          15:31:28API Interceptor870x Sleep call for process: dYy3yfSkwY.exe modified
          15:31:35AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ppeejliapu C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
          15:31:41API Interceptor1x Sleep call for process: opjlpsercy.exe modified

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          79.134.225.90Purchase Order Price List 061021.xlsxGet hashmaliciousBrowse
            ZVFVY7NwZ7.exeGet hashmaliciousBrowse
              kyIfnzzg3E.exeGet hashmaliciousBrowse
                Ref 0180066743.xlsxGet hashmaliciousBrowse
                  AedJpyQ9lM.exeGet hashmaliciousBrowse
                    Purchase Order Price List.xlsxGet hashmaliciousBrowse
                      qdFDmi3Bhy.exeGet hashmaliciousBrowse
                        A2PlnLyOA7.exeGet hashmaliciousBrowse
                          SecuriteInfo.com.Trojan.GenericKD.37013274.28794.exeGet hashmaliciousBrowse
                            LOT_20210526.xlsxGet hashmaliciousBrowse
                              Q2MAUt4mRO.exeGet hashmaliciousBrowse
                                4fn66P5vkl.exeGet hashmaliciousBrowse
                                  P_O 00041221.xlsxGet hashmaliciousBrowse
                                    LOT_20210526.xlsxGet hashmaliciousBrowse
                                      Swift Copy.exeGet hashmaliciousBrowse

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        wekeepworking.sytes.netPurchase Order Price List 061021.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        ZVFVY7NwZ7.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        kyIfnzzg3E.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        Ref 0180066743.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        AedJpyQ9lM.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        qdFDmi3Bhy.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        A2PlnLyOA7.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        SecuriteInfo.com.Trojan.GenericKD.37013274.28794.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        LOT_20210526.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        Q2MAUt4mRO.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        4fn66P5vkl.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        P_O 00041221.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        LOT_20210526.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        QI5MR3pte0.exeGet hashmaliciousBrowse
                                        • 185.140.53.40
                                        5Em2NXNxSt.exeGet hashmaliciousBrowse
                                        • 185.140.53.40
                                        7Zpsd899Kf.exeGet hashmaliciousBrowse
                                        • 185.140.53.40
                                        LfgEatrwIF.exeGet hashmaliciousBrowse
                                        • 185.140.53.40

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        FINK-TELECOM-SERVICESCHPurchase Order Price List 061021.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        ZVFVY7NwZ7.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        0jyrU2E05S.exeGet hashmaliciousBrowse
                                        • 79.134.225.72
                                        kyIfnzzg3E.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        Ref 0180066743.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        MS2106071066.exeGet hashmaliciousBrowse
                                        • 79.134.225.71
                                        Kangean PO.docGet hashmaliciousBrowse
                                        • 79.134.225.72
                                        facture.jarGet hashmaliciousBrowse
                                        • 79.134.225.69
                                        c3yBu1IF57.exeGet hashmaliciousBrowse
                                        • 79.134.225.92
                                        DPSGNwkO1Z.exeGet hashmaliciousBrowse
                                        • 79.134.225.25
                                        SecuriteInfo.com.Trojan.Win32.Save.a.16917.exeGet hashmaliciousBrowse
                                        • 79.134.225.94
                                        AedJpyQ9lM.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        H538065217Invoice.exeGet hashmaliciousBrowse
                                        • 79.134.225.9
                                        Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        P.I-84512.docGet hashmaliciousBrowse
                                        • 79.134.225.41
                                        l00VLAF9y0xQ9Vr.exeGet hashmaliciousBrowse
                                        • 79.134.225.92
                                        Swift [ref QT #U2013 2102001-R2]pdf.exeGet hashmaliciousBrowse
                                        • 79.134.225.10
                                        PO756654.exeGet hashmaliciousBrowse
                                        • 79.134.225.99
                                        qdFDmi3Bhy.exeGet hashmaliciousBrowse
                                        • 79.134.225.90
                                        br.exeGet hashmaliciousBrowse
                                        • 79.134.225.73

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        C:\Users\user\AppData\Local\Temp\nso6CF2.tmp\System.dllPAYMENT 02.BHN-DK.2021 (PO#4500111226).xlsxGet hashmaliciousBrowse
                                          Purchase Order Price List 061021.xlsxGet hashmaliciousBrowse
                                            Proforma Invoice and Bank swift-REG.PI-0086547654.exeGet hashmaliciousBrowse
                                              UGGJ4NnzFz.exeGet hashmaliciousBrowse
                                                Proforma Invoice and Bank swift-REG.PI-0086547654.exeGet hashmaliciousBrowse
                                                  3arZKnr21W.exeGet hashmaliciousBrowse
                                                    Shipping receipt.exeGet hashmaliciousBrowse
                                                      New Order TL273723734533.pdf.exeGet hashmaliciousBrowse
                                                        YZ8OvkljWm.exeGet hashmaliciousBrowse
                                                          U03c2doc.exeGet hashmaliciousBrowse
                                                            QUOTE061021.exeGet hashmaliciousBrowse
                                                              PAYMENT CONFIRMATION.exeGet hashmaliciousBrowse
                                                                PO187439.exeGet hashmaliciousBrowse
                                                                  090009000000090.exeGet hashmaliciousBrowse
                                                                    NEWORDERLIST.exeGet hashmaliciousBrowse
                                                                      00404000004.exeGet hashmaliciousBrowse
                                                                        40900900090000.exeGet hashmaliciousBrowse
                                                                          INVO090090202.exeGet hashmaliciousBrowse
                                                                            SecuriteInfo.com.W32.Injector.AIC.genEldorado.29599.exeGet hashmaliciousBrowse
                                                                              D1E3656B4E1C609B2540CFF74F59319A52D7FABF4CC51.exeGet hashmaliciousBrowse

                                                                                Created / dropped Files

                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\opjlpsercy.exe.log
                                                                                Process:C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):525
                                                                                Entropy (8bit):5.2874233355119316
                                                                                Encrypted:false
                                                                                SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                                                MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                                                SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                                                SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                                                SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                                                Malicious:true
                                                                                Reputation:high, very likely benign file
                                                                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                                                C:\Users\user\AppData\Local\Temp\eq64oqvr7vut3n4dt5cu
                                                                                Process:C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                File Type:data
                                                                                Category:modified
                                                                                Size (bytes):616448
                                                                                Entropy (8bit):7.999692733314968
                                                                                Encrypted:true
                                                                                SSDEEP:12288:2Ph/JQuO9xgeB2Q54fr2dM4av0CGBmhFoqS3UDmhcOQV5eZTr:6diuMxgy6frQuv0L0hFoqSkDmhcOsS/
                                                                                MD5:7A73EF366D5F76E92D47C3064D0E3A26
                                                                                SHA1:C7638BBDAB4934280BD2A5F5B004623568BBD876
                                                                                SHA-256:55713D87E066560138EB389AB6FE3DB6EA642EB5C0149992FC99A38D09AA86B4
                                                                                SHA-512:908A167E2692BA331A06770A818FA9C2A7CB325374A2EEA086FB499B6069B6B7D0C6667D49BB49DDC5877B8A2BA22ABF9E0AF531A38487058CBBF7408D9C1906
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview: }.........e... 6..5Ckz...p.wB....}...e..O./r.5R..r.V..;]A.N..Jgmi...Z%r.R.)4...-4..pYG.q..by.......|.=~_+xi.@N...+<.!.R.m.f~}..!*.(C.......[.4@?1..._.l.5....l......+..cy..+]...U*.u5...f.}n....t.F. =..$d..D...GX...0H..J6...J.BT..%...O..t.'P....f.....u..._<.f&(Z.K....^..W.?...?..k.k@...z.....O.R..N..JsI.)i.8n.:...k*..`..]...,3.[j.{UE...>.Q.]J-...(..G~....%p...x...~.Gv...........t.........3..:U3.FG..$rr.)......_....2.!.o.B......~....'.x...c..V43....,].0L{.KIl0....d0...4.....#..._P.T+..ROQ...3..1.Z...)._*.G,...*...>.`.......c.b]..B.....j....?..+.F..P?..........[p/\u.3..Q.j..d....<+...~S....t..:=Z...!U.)H..+.X..R.F.;E.w.k@G.pE[6..,.d....P.z...s.YQ..@..6....~M.f`....,-.l=..........:.(...j7..7p...P|=...x..Kbl...........[..Y.s...FG.b.x...(.....Ol.)....,.p.....3jx..#X..2..*q...G...W(D~r..KuoH...@Toi[....*h"g.e...=.<g..W/.4.~.Z..tH....H.i......;..om.C.5+S...E.........../.V.,..&|...i....9W".~..&..,.?.w B.9......}....7&.JjFU.......E'.........
                                                                                C:\Users\user\AppData\Local\Temp\fonknpk
                                                                                Process:C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):60113
                                                                                Entropy (8bit):4.930356039937102
                                                                                Encrypted:false
                                                                                SSDEEP:1536:Fqa448V8tJKh6oKyLiTltDtnbBZdZzzzhxaWFg:0amCJKh6onaltDtn9nZzzWz
                                                                                MD5:E25AE6DAF4BB7B1AA0EF37BBC646B782
                                                                                SHA1:5C728BDBDC69527306370AECC6D5C268523F043B
                                                                                SHA-256:61CA2BDC62BD28E9B004B7F109F66FC8B0344A24FFDBF50EBBB0106A54865B01
                                                                                SHA-512:1A1DA41FDB905C7D54877E9E16F71FF37662BE2AB6A1C1E2AC46BC7600ECEB6323894839424C7A7A06C2FC366BB0A59F070BD56AD3CE1070335CBA56AB88051A
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview: U..!.......T...%.U...h.V...<.W...,.X...,.Y.....Z.....[...(.\.....]...n.^...0._...,.`.....a.....b...(.c.....d...(.e...x.f...#.g...,.h...,.i.....j.....k.....l...,.m...c.n.....o...d.p...<.q...,.r...,.s...,.t.....u.....v...H.w.....x.....y.....z.....{.....|...d.}...,.~.........2.......................b.....,.....,...........................................................d.......................d.....'.....P.....c...........l...........,.....,.....,.......................+.....+.....+.................p.................l.....,...........2.................p.....b.....,.....,.................p.......................p.................l.......................l.....'.....P.....c.................$.....,.....,.....,.......................+.....+.....+.................x.......................,...........2.................x.....b.....,.....,.................x
                                                                                C:\Users\user\AppData\Local\Temp\nso6CF1.tmp
                                                                                Process:C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):709852
                                                                                Entropy (8bit):7.87001429899952
                                                                                Encrypted:false
                                                                                SSDEEP:12288:4Ph/JQuO9xgeB2Q54fr2dM4av0CGBmhFoqS3UDmhcOQV5eZTB6oI5BN:cdiuMxgy6frQuv0L0hFoqSkDmhcOsS98
                                                                                MD5:AEF5690996B3714098A9E0B69D9E5828
                                                                                SHA1:24B935683ECD3F3AF9F9EFE2620D6D05EFFED89C
                                                                                SHA-256:DBAADCC0481847BAB4237EDCF2F4990A047D5821BDFE186931103EAF17250101
                                                                                SHA-512:1F4A7C2FBD9553F7771B30CB907F7BAF3F4CF89450D9A79272250BA986CF92A249BE5E79827D332F709CEA8229EF37043F4236C626FDB82150EFD7AFE4D9DBED
                                                                                Malicious:false
                                                                                Preview: .S......,.......................T=.......S.......S..........................................................................................................................................................................................................................................J...................j...............................................................................................................................q.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nso6CF2.tmp\System.dll
                                                                                Process:C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:modified
                                                                                Size (bytes):11776
                                                                                Entropy (8bit):5.855045165595541
                                                                                Encrypted:false
                                                                                SSDEEP:192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
                                                                                MD5:FCCFF8CB7A1067E23FD2E2B63971A8E1
                                                                                SHA1:30E2A9E137C1223A78A0F7B0BF96A1C361976D91
                                                                                SHA-256:6FCEA34C8666B06368379C6C402B5321202C11B00889401C743FB96C516C679E
                                                                                SHA-512:F4335E84E6F8D70E462A22F1C93D2998673A7616C868177CAC3E8784A3BE1D7D0BB96F2583FA0ED82F4F2B6B8F5D9B33521C279A42E055D80A94B4F3F1791E0C
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: PAYMENT 02.BHN-DK.2021 (PO#4500111226).xlsx, Detection: malicious, Browse
                                                                                • Filename: Purchase Order Price List 061021.xlsx, Detection: malicious, Browse
                                                                                • Filename: Proforma Invoice and Bank swift-REG.PI-0086547654.exe, Detection: malicious, Browse
                                                                                • Filename: UGGJ4NnzFz.exe, Detection: malicious, Browse
                                                                                • Filename: Proforma Invoice and Bank swift-REG.PI-0086547654.exe, Detection: malicious, Browse
                                                                                • Filename: 3arZKnr21W.exe, Detection: malicious, Browse
                                                                                • Filename: Shipping receipt.exe, Detection: malicious, Browse
                                                                                • Filename: New Order TL273723734533.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: YZ8OvkljWm.exe, Detection: malicious, Browse
                                                                                • Filename: U03c2doc.exe, Detection: malicious, Browse
                                                                                • Filename: QUOTE061021.exe, Detection: malicious, Browse
                                                                                • Filename: PAYMENT CONFIRMATION.exe, Detection: malicious, Browse
                                                                                • Filename: PO187439.exe, Detection: malicious, Browse
                                                                                • Filename: 090009000000090.exe, Detection: malicious, Browse
                                                                                • Filename: NEWORDERLIST.exe, Detection: malicious, Browse
                                                                                • Filename: 00404000004.exe, Detection: malicious, Browse
                                                                                • Filename: 40900900090000.exe, Detection: malicious, Browse
                                                                                • Filename: INVO090090202.exe, Detection: malicious, Browse
                                                                                • Filename: SecuriteInfo.com.W32.Injector.AIC.genEldorado.29599.exe, Detection: malicious, Browse
                                                                                • Filename: D1E3656B4E1C609B2540CFF74F59319A52D7FABF4CC51.exe, Detection: malicious, Browse
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....$_...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nsx8F4E.tmp
                                                                                Process:C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):677854
                                                                                Entropy (8bit):7.91702747805609
                                                                                Encrypted:false
                                                                                SSDEEP:12288:4Ph/JQuO9xgeB2Q54fr2dM4av0CGBmhFoqS3UDmhcOQV5eZTB6oIL:cdiuMxgy6frQuv0L0hFoqSkDmhcOsS9a
                                                                                MD5:DD79AD8B5A51E756E3D0A2E149070DAA
                                                                                SHA1:9A999AE83C3078E311859D2AC02D97C8A95D4A51
                                                                                SHA-256:90B79E2B60E81A85EAFEA954724DD02BA7FAAF8CE63A3AD5C94BE5CDE5CE4256
                                                                                SHA-512:3F56D2AFEB344DC19DDEA59A8504366D1E118F2B4824CBC0E967D22BC2E616A726E7C846AABE7A3ED602B6328CB82A7338D4F97114DEC67FB896780A43E16D5F
                                                                                Malicious:false
                                                                                Preview: .S......,.......................T=.......S.......S..........................................................................................................................................................................................................................................J...................j...............................................................................................................................q.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nsz21EE.tmp
                                                                                Process:C:\Users\user\Desktop\dYy3yfSkwY.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):709852
                                                                                Entropy (8bit):7.87001429899952
                                                                                Encrypted:false
                                                                                SSDEEP:12288:4Ph/JQuO9xgeB2Q54fr2dM4av0CGBmhFoqS3UDmhcOQV5eZTB6oI5BN:cdiuMxgy6frQuv0L0hFoqSkDmhcOsS98
                                                                                MD5:AEF5690996B3714098A9E0B69D9E5828
                                                                                SHA1:24B935683ECD3F3AF9F9EFE2620D6D05EFFED89C
                                                                                SHA-256:DBAADCC0481847BAB4237EDCF2F4990A047D5821BDFE186931103EAF17250101
                                                                                SHA-512:1F4A7C2FBD9553F7771B30CB907F7BAF3F4CF89450D9A79272250BA986CF92A249BE5E79827D332F709CEA8229EF37043F4236C626FDB82150EFD7AFE4D9DBED
                                                                                Malicious:false
                                                                                Preview: .S......,.......................T=.......S.......S..........................................................................................................................................................................................................................................J...................j...............................................................................................................................q.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nsz21EF.tmp\System.dll
                                                                                Process:C:\Users\user\Desktop\dYy3yfSkwY.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):11776
                                                                                Entropy (8bit):5.855045165595541
                                                                                Encrypted:false
                                                                                SSDEEP:192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
                                                                                MD5:FCCFF8CB7A1067E23FD2E2B63971A8E1
                                                                                SHA1:30E2A9E137C1223A78A0F7B0BF96A1C361976D91
                                                                                SHA-256:6FCEA34C8666B06368379C6C402B5321202C11B00889401C743FB96C516C679E
                                                                                SHA-512:F4335E84E6F8D70E462A22F1C93D2998673A7616C868177CAC3E8784A3BE1D7D0BB96F2583FA0ED82F4F2B6B8F5D9B33521C279A42E055D80A94B4F3F1791E0C
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....$_...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                Process:C:\Users\user\Desktop\dYy3yfSkwY.exe
                                                                                File Type:ISO-8859 text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):8
                                                                                Entropy (8bit):3.0
                                                                                Encrypted:false
                                                                                SSDEEP:3:JR5tn:Rt
                                                                                MD5:537E946452ACB3A53CA8A63365818B7D
                                                                                SHA1:D0AB80082C59716C5C9A98284944590E5181BAE1
                                                                                SHA-256:F1C48C451E7B84D0CA328645EBBFCF632B9AA3ECAEE74FB36F3A84A2576B08FC
                                                                                SHA-512:2BF90A1A45B9F9A8351E3F1140C1D4151DABB3104F70C9C4A61F5CB43D0EECC1B2B6CD171A24899DDC1010ABA4BE450BFD46A101A3F7E05B86ED3935A5172763
                                                                                Malicious:true
                                                                                Preview: ...|_,.H
                                                                                C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                Process:C:\Users\user\Desktop\dYy3yfSkwY.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                Category:modified
                                                                                Size (bytes):682684
                                                                                Entropy (8bit):7.985587248644902
                                                                                Encrypted:false
                                                                                SSDEEP:12288:y4Bwh6Ga/zhQmHMbNdSsTIDy5dX5Z6fdBUd+YiUjBumJBP4/MW:y4B/Ga/zhQ0MhTUCdX5Z6fd24YZjkmJy
                                                                                MD5:3DEB8B7E51C21CBA0C2C723C5AF953DD
                                                                                SHA1:F98809B1B883912D278F7EAF64D7EEDFAEE1EF5A
                                                                                SHA-256:C0503F7C65391A5BE8030BBAAF6C17260FA67E40A3FCC23B84C26610C266008B
                                                                                SHA-512:27B12686A9979FD2107806B3C923F5E616FEA6F9DBFA0DBC1516FEE88C330B3DD81C82794E20F085FDF324E1EA4EFF9B4A942E55FB19F13CE1DBE24074E76A94
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                • Antivirus: ReversingLabs, Detection: 35%
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................\..........<2.......p....@..........................................................................s.......................................................................................p...............................text...ZZ.......\.................. ..`.rdata.......p.......`..............@..@.data................r..............@....ndata.......@...........................rsrc................v..............@..@................................................................................................................................................................................................................................................................................................................................................

                                                                                Static File Info

                                                                                General

                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                Entropy (8bit):7.985587248644902
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 92.16%
                                                                                • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:dYy3yfSkwY.exe
                                                                                File size:682684
                                                                                MD5:3deb8b7e51c21cba0c2c723c5af953dd
                                                                                SHA1:f98809b1b883912d278f7eaf64d7eedfaee1ef5a
                                                                                SHA256:c0503f7c65391a5be8030bbaaf6c17260fa67e40a3fcc23b84c26610c266008b
                                                                                SHA512:27b12686a9979fd2107806b3c923f5e616fea6f9dbfa0dbc1516fee88c330b3dd81c82794e20f085fdf324e1ea4eff9b4a942e55fb19f13ce1dbe24074e76a94
                                                                                SSDEEP:12288:y4Bwh6Ga/zhQmHMbNdSsTIDy5dX5Z6fdBUd+YiUjBumJBP4/MW:y4B/Ga/zhQ0MhTUCdX5Z6fd24YZjkmJy
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................\.........

                                                                                File Icon

                                                                                Icon Hash:b2a88c96b2ca6a72

                                                                                Static PE Info

                                                                                General

                                                                                Entrypoint:0x40323c
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x4B1AE3C6 [Sat Dec 5 22:50:46 2009 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:099c0646ea7282d232219f8807883be0

                                                                                Entrypoint Preview

                                                                                Instruction
                                                                                sub esp, 00000180h
                                                                                push ebx
                                                                                push ebp
                                                                                push esi
                                                                                xor ebx, ebx
                                                                                push edi
                                                                                mov dword ptr [esp+18h], ebx
                                                                                mov dword ptr [esp+10h], 00409130h
                                                                                xor esi, esi
                                                                                mov byte ptr [esp+14h], 00000020h
                                                                                call dword ptr [00407030h]
                                                                                push 00008001h
                                                                                call dword ptr [004070B4h]
                                                                                push ebx
                                                                                call dword ptr [0040727Ch]
                                                                                push 00000008h
                                                                                mov dword ptr [00423F58h], eax
                                                                                call 00007EFCEC7B83BEh
                                                                                mov dword ptr [00423EA4h], eax
                                                                                push ebx
                                                                                lea eax, dword ptr [esp+34h]
                                                                                push 00000160h
                                                                                push eax
                                                                                push ebx
                                                                                push 0041F458h
                                                                                call dword ptr [00407158h]
                                                                                push 004091B8h
                                                                                push 004236A0h
                                                                                call 00007EFCEC7B8071h
                                                                                call dword ptr [004070B0h]
                                                                                mov edi, 00429000h
                                                                                push eax
                                                                                push edi
                                                                                call 00007EFCEC7B805Fh
                                                                                push ebx
                                                                                call dword ptr [0040710Ch]
                                                                                cmp byte ptr [00429000h], 00000022h
                                                                                mov dword ptr [00423EA0h], eax
                                                                                mov eax, edi
                                                                                jne 00007EFCEC7B57BCh
                                                                                mov byte ptr [esp+14h], 00000022h
                                                                                mov eax, 00429001h
                                                                                push dword ptr [esp+14h]
                                                                                push eax
                                                                                call 00007EFCEC7B7B52h
                                                                                push eax
                                                                                call dword ptr [0040721Ch]
                                                                                mov dword ptr [esp+1Ch], eax
                                                                                jmp 00007EFCEC7B5815h
                                                                                cmp cl, 00000020h
                                                                                jne 00007EFCEC7B57B8h
                                                                                inc eax
                                                                                cmp byte ptr [eax], 00000020h
                                                                                je 00007EFCEC7B57ACh
                                                                                cmp byte ptr [eax], 00000022h
                                                                                mov byte ptr [eax+eax+00h], 00000000h

                                                                                Rich Headers

                                                                                Programming Language:
                                                                                • [EXP] VC++ 6.0 SP5 build 8804

                                                                                Data Directories

                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x9e0.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                Sections

                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x5a5a0x5c00False0.660453464674data6.41769823686IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x70000x11900x1200False0.4453125data5.18162709925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0x90000x1af980x400False0.55859375data4.70902740305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x2c0000x9e00xa00False0.45625data4.51012867721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                                Resources

                                                                                NameRVASizeTypeLanguageCountry
                                                                                RT_ICON0x2c1900x2e8dataEnglishUnited States
                                                                                RT_DIALOG0x2c4780x100dataEnglishUnited States
                                                                                RT_DIALOG0x2c5780x11cdataEnglishUnited States
                                                                                RT_DIALOG0x2c6980x60dataEnglishUnited States
                                                                                RT_GROUP_ICON0x2c6f80x14dataEnglishUnited States
                                                                                RT_MANIFEST0x2c7100x2ccXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                                                Imports

                                                                                DLLImport
                                                                                KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                                                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                                                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                                                                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                                                                ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                                                                                Possible Origin

                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishUnited States

                                                                                Network Behavior

                                                                                Network Port Distribution

                                                                                TCP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jun 10, 2021 15:31:32.256170034 CEST497221144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:31:32.298551083 CEST11444972279.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:31:32.892158031 CEST497221144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:31:32.938452959 CEST11444972279.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:31:33.595318079 CEST497221144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:31:33.637559891 CEST11444972279.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:31:38.517224073 CEST497261144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:31:38.559596062 CEST11444972679.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:31:39.174496889 CEST497261144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:31:39.216864109 CEST11444972679.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:31:39.783345938 CEST497261144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:31:39.825738907 CEST11444972679.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:31:44.200570107 CEST497271144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:31:44.243030071 CEST11444972779.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:31:44.787401915 CEST497271144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:31:44.830368996 CEST11444972779.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:31:45.397412062 CEST497271144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:31:45.439717054 CEST11444972779.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:06.227036953 CEST497321144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:06.269305944 CEST11444973279.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:06.785947084 CEST497321144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:06.828233004 CEST11444973279.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:07.473495007 CEST497321144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:07.515722036 CEST11444973279.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:11.718996048 CEST497341144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:11.761199951 CEST11444973479.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:12.458354950 CEST497341144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:12.500622034 CEST11444973479.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:13.052083969 CEST497341144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:13.094351053 CEST11444973479.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:17.793564081 CEST497381144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:17.835836887 CEST11444973879.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:18.474428892 CEST497381144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:18.516717911 CEST11444973879.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:19.177577019 CEST497381144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:19.219825029 CEST11444973879.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:38.670109987 CEST497441144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:38.712363958 CEST11444974479.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:39.288662910 CEST497441144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:39.331089973 CEST11444974479.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:39.835565090 CEST497441144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:39.877747059 CEST11444974479.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:44.098090887 CEST497451144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:44.140352011 CEST11444974579.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:44.648504972 CEST497451144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:44.690763950 CEST11444974579.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:45.195491076 CEST497451144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:45.239675045 CEST11444974579.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:49.354127884 CEST497471144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:49.397049904 CEST11444974779.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:50.039633989 CEST497471144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:50.081835985 CEST11444974779.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:32:50.649142027 CEST497471144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:32:50.691443920 CEST11444974779.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:07.713429928 CEST497581144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:07.756568909 CEST11444975879.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:08.259960890 CEST497581144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:08.302097082 CEST11444975879.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:08.806840897 CEST497581144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:08.849529028 CEST11444975879.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:12.967438936 CEST497601144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:13.009537935 CEST11444976079.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:13.510713100 CEST497601144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:13.553210020 CEST11444976079.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:14.057358980 CEST497601144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:14.100600004 CEST11444976079.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:18.382356882 CEST497611144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:18.424823999 CEST11444976179.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:18.932743073 CEST497611144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:18.975100040 CEST11444976179.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:19.481445074 CEST497611144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:19.524384975 CEST11444976179.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:37.387742996 CEST497621144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:37.430013895 CEST11444976279.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:37.934243917 CEST497621144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:37.976334095 CEST11444976279.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:38.481170893 CEST497621144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:38.523412943 CEST11444976279.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:42.592185020 CEST497631144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:42.635420084 CEST11444976379.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:43.137872934 CEST497631144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:43.180259943 CEST11444976379.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:43.684914112 CEST497631144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:43.727236986 CEST11444976379.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:47.794301987 CEST497641144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:47.836405039 CEST11444976479.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:48.341409922 CEST497641144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:48.383826971 CEST11444976479.134.225.90192.168.2.7
                                                                                Jun 10, 2021 15:33:48.900970936 CEST497641144192.168.2.779.134.225.90
                                                                                Jun 10, 2021 15:33:48.943218946 CEST11444976479.134.225.90192.168.2.7

                                                                                UDP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jun 10, 2021 15:31:09.740479946 CEST5659053192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:09.802063942 CEST53565908.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:09.883162022 CEST6050153192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:09.890121937 CEST5377553192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:09.940694094 CEST53537758.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:09.944700956 CEST53605018.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:10.568686008 CEST5183753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:10.628315926 CEST53518378.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:11.021814108 CEST5541153192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:11.074650049 CEST53554118.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:11.882250071 CEST6366853192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:11.935273886 CEST53636688.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:12.798441887 CEST5464053192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:12.850076914 CEST53546408.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:13.890249968 CEST5873953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:13.940596104 CEST53587398.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:15.300690889 CEST6033853192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:15.350857973 CEST53603388.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:16.270309925 CEST5871753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:16.328941107 CEST53587178.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:17.423224926 CEST5976253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:17.473433018 CEST53597628.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:18.508713961 CEST5432953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:18.561316013 CEST53543298.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:19.659454107 CEST5805253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:19.711213112 CEST53580528.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:20.854224920 CEST5400853192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:20.908163071 CEST53540088.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:21.731374979 CEST5945153192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:21.781802893 CEST53594518.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:22.975914955 CEST5291453192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:23.026335001 CEST53529148.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:23.770872116 CEST6456953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:23.821301937 CEST53645698.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:25.417072058 CEST5281653192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:25.470490932 CEST53528168.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:26.555752993 CEST5078153192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:26.606208086 CEST53507818.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:27.949960947 CEST5423053192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:28.000865936 CEST53542308.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:28.952749014 CEST5491153192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:29.003180027 CEST53549118.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:30.239001989 CEST4995853192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:30.292411089 CEST53499588.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:31.213304996 CEST5086053192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:31.263319016 CEST53508608.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:32.181307077 CEST5045253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:32.241700888 CEST53504528.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:32.318706036 CEST5973053192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:32.368755102 CEST53597308.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:33.951366901 CEST5931053192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:34.012972116 CEST53593108.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:38.392396927 CEST5191953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:38.456140041 CEST53519198.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:44.103826046 CEST6429653192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:44.165118933 CEST53642968.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:50.121778965 CEST5668053192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:50.187407017 CEST53566808.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:50.405025959 CEST5882053192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:31:50.463737011 CEST53588208.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:31:51.727444887 CEST6098353192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:51.787632942 CEST53609838.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:54.240236044 CEST4924753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:54.300666094 CEST53492478.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:56.567003012 CEST5228653192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:56.628379107 CEST53522868.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:31:56.670478106 CEST5606453192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:31:56.733058929 CEST53560648.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:31:57.163907051 CEST6374453192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:31:57.224091053 CEST53637448.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:01.350749016 CEST6145753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:01.409303904 CEST53614578.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:01.448018074 CEST5836753192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:32:01.506397009 CEST53583678.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:32:01.741183043 CEST6059953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:01.799926043 CEST53605998.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:04.091943979 CEST5957153192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:04.155689001 CEST53595718.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:06.151912928 CEST5268953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:06.210746050 CEST53526898.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:06.367481947 CEST5029053192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:06.426503897 CEST53502908.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:11.659318924 CEST6042753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:11.717715979 CEST53604278.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:14.530011892 CEST5620953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:14.590982914 CEST53562098.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:17.732811928 CEST5958253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:17.791794062 CEST53595828.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:23.874396086 CEST6094953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:23.936460018 CEST53609498.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:24.386266947 CEST5854253192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:32:24.440260887 CEST53585428.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:32:24.450488091 CEST5917953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:24.512348890 CEST53591798.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:29.021514893 CEST6092753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:29.071624994 CEST53609278.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:29.627389908 CEST5785453192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:32:29.680424929 CEST53578548.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:32:30.022881985 CEST6202653192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:30.082581997 CEST53620268.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:31.405217886 CEST5945353192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:31.468714952 CEST53594538.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:34.235707998 CEST6246853192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:34.296143055 CEST53624688.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:34.343688965 CEST5256353192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:32:34.394994020 CEST53525638.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:32:34.449165106 CEST5472153192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:34.502379894 CEST53547218.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:38.559259892 CEST6282653192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:38.619369984 CEST53628268.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:44.031632900 CEST6204653192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:44.094465971 CEST53620468.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:49.139123917 CEST5122353192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:49.203449011 CEST53512238.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:49.292860985 CEST6390853192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:49.351901054 CEST53639088.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:50.428004026 CEST4922653192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:50.487853050 CEST53492268.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:51.227231026 CEST6021253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:51.286628962 CEST53602128.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:51.499828100 CEST5886753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:51.559743881 CEST53588678.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:52.368303061 CEST5086453192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:52.429727077 CEST53508648.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:53.433163881 CEST6150453192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:53.492062092 CEST53615048.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:54.548741102 CEST6023153192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:54.607161999 CEST53602318.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:54.726989031 CEST5009553192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:54.787355900 CEST53500958.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:54.834827900 CEST5965453192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:32:54.894740105 CEST53596548.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:32:54.959928989 CEST5823353192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:55.021729946 CEST53582338.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:55.823683023 CEST5682253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:55.886241913 CEST53568228.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:57.232855082 CEST6257253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:57.283457994 CEST53625728.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:58.623877048 CEST5717953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:58.682997942 CEST53571798.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:59.071983099 CEST5612453192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:59.133754969 CEST53561248.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:59.138362885 CEST6228753192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:32:59.199341059 CEST53622878.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:32:59.245536089 CEST5464453192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:59.309763908 CEST53546448.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:32:59.916569948 CEST5915953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:32:59.969732046 CEST53591598.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:03.369879961 CEST5792453192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:03.428838968 CEST53579248.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:03.432816029 CEST5171253192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:33:03.491652012 CEST53517128.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:33:03.528409958 CEST5886553192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:03.587806940 CEST53588658.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:07.648883104 CEST6433753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:07.710572958 CEST53643378.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:11.301757097 CEST5040753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:11.363635063 CEST53504078.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:12.904831886 CEST6107553192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:12.966074944 CEST53610758.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:18.322038889 CEST5495253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:18.380691051 CEST53549528.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:23.732136011 CEST5918653192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:23.782618046 CEST53591868.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:23.784437895 CEST5228053192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:33:24.804606915 CEST5228053192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:33:24.866513014 CEST53522808.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:33:24.870029926 CEST5179453192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:24.920176983 CEST53517948.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:28.934925079 CEST5081553192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:28.994024038 CEST53508158.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:28.995167971 CEST5849853192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:33:29.057069063 CEST53584988.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:33:29.060477018 CEST5686253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:29.110584974 CEST53568628.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:33.122565985 CEST6180753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:33.181468964 CEST53618078.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:33.182643890 CEST5200953192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:33:33.244641066 CEST53520098.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:33:33.247688055 CEST5864853192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:33.309820890 CEST53586488.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:37.327805996 CEST5933753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:37.386540890 CEST53593378.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:42.529644012 CEST5926953192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:42.590915918 CEST53592698.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:47.733093977 CEST4980253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:47.793531895 CEST53498028.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:52.950977087 CEST5070653192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:53.010107994 CEST53507068.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:53.011431932 CEST5515353192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:33:53.079495907 CEST53551538.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:33:53.083364010 CEST5974453192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:53.144140005 CEST53597448.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:57.159787893 CEST5998753192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:57.218821049 CEST53599878.8.8.8192.168.2.7
                                                                                Jun 10, 2021 15:33:57.220031977 CEST6127253192.168.2.78.8.4.4
                                                                                Jun 10, 2021 15:33:57.282882929 CEST53612728.8.4.4192.168.2.7
                                                                                Jun 10, 2021 15:33:57.286722898 CEST5435253192.168.2.78.8.8.8
                                                                                Jun 10, 2021 15:33:57.339939117 CEST53543528.8.8.8192.168.2.7

                                                                                DNS Queries

                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                Jun 10, 2021 15:31:32.181307077 CEST192.168.2.78.8.8.80xcbedStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:38.392396927 CEST192.168.2.78.8.8.80xc120Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:44.103826046 CEST192.168.2.78.8.8.80x6d75Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:50.121778965 CEST192.168.2.78.8.8.80xd449Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:50.405025959 CEST192.168.2.78.8.4.40x13a9Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:51.727444887 CEST192.168.2.78.8.8.80x6724Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:56.567003012 CEST192.168.2.78.8.8.80x55d5Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:56.670478106 CEST192.168.2.78.8.4.40x511Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:57.163907051 CEST192.168.2.78.8.8.80x2c7fStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:01.350749016 CEST192.168.2.78.8.8.80x8a28Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:01.448018074 CEST192.168.2.78.8.4.40xe2cdStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:01.741183043 CEST192.168.2.78.8.8.80x1878Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:06.151912928 CEST192.168.2.78.8.8.80xb2e0Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:11.659318924 CEST192.168.2.78.8.8.80x5e2eStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:17.732811928 CEST192.168.2.78.8.8.80x96e4Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:23.874396086 CEST192.168.2.78.8.8.80xd453Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:24.386266947 CEST192.168.2.78.8.4.40xc18eStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:24.450488091 CEST192.168.2.78.8.8.80x1ed3Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:29.021514893 CEST192.168.2.78.8.8.80xe87cStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:29.627389908 CEST192.168.2.78.8.4.40xb61bStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:30.022881985 CEST192.168.2.78.8.8.80xfaffStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:34.235707998 CEST192.168.2.78.8.8.80x9149Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:34.343688965 CEST192.168.2.78.8.4.40x12e6Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:34.449165106 CEST192.168.2.78.8.8.80xcd26Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:38.559259892 CEST192.168.2.78.8.8.80x1154Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:44.031632900 CEST192.168.2.78.8.8.80xd929Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:49.292860985 CEST192.168.2.78.8.8.80x2e28Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:54.726989031 CEST192.168.2.78.8.8.80x31d2Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:54.834827900 CEST192.168.2.78.8.4.40x5b98Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:54.959928989 CEST192.168.2.78.8.8.80x826dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:59.071983099 CEST192.168.2.78.8.8.80x249cStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:59.138362885 CEST192.168.2.78.8.4.40x19bbStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:59.245536089 CEST192.168.2.78.8.8.80x9170Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:03.369879961 CEST192.168.2.78.8.8.80x20efStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:03.432816029 CEST192.168.2.78.8.4.40xe0acStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:03.528409958 CEST192.168.2.78.8.8.80xbe2bStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:07.648883104 CEST192.168.2.78.8.8.80xd36Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:12.904831886 CEST192.168.2.78.8.8.80x308eStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:18.322038889 CEST192.168.2.78.8.8.80x6a52Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:23.732136011 CEST192.168.2.78.8.8.80x9e46Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:23.784437895 CEST192.168.2.78.8.4.40xd2daStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:24.804606915 CEST192.168.2.78.8.4.40xd2daStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:24.870029926 CEST192.168.2.78.8.8.80x93b6Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:28.934925079 CEST192.168.2.78.8.8.80x88c6Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:28.995167971 CEST192.168.2.78.8.4.40x32f7Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:29.060477018 CEST192.168.2.78.8.8.80x63cfStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:33.122565985 CEST192.168.2.78.8.8.80x3f68Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:33.182643890 CEST192.168.2.78.8.4.40xcf42Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:33.247688055 CEST192.168.2.78.8.8.80xc9fbStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:37.327805996 CEST192.168.2.78.8.8.80x8b83Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:42.529644012 CEST192.168.2.78.8.8.80xb5edStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:47.733093977 CEST192.168.2.78.8.8.80x4f3fStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:52.950977087 CEST192.168.2.78.8.8.80x8b88Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:53.011431932 CEST192.168.2.78.8.4.40x2aaeStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:53.083364010 CEST192.168.2.78.8.8.80x6ceeStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:57.159787893 CEST192.168.2.78.8.8.80x2987Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:57.220031977 CEST192.168.2.78.8.4.40x97edStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:57.286722898 CEST192.168.2.78.8.8.80xab9dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)

                                                                                DNS Answers

                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                Jun 10, 2021 15:31:32.241700888 CEST8.8.8.8192.168.2.70xcbedNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:38.456140041 CEST8.8.8.8192.168.2.70xc120No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:31:44.165118933 CEST8.8.8.8192.168.2.70x6d75No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:06.210746050 CEST8.8.8.8192.168.2.70xb2e0No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:11.717715979 CEST8.8.8.8192.168.2.70x5e2eNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:17.791794062 CEST8.8.8.8192.168.2.70x96e4No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:38.619369984 CEST8.8.8.8192.168.2.70x1154No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:44.094465971 CEST8.8.8.8192.168.2.70xd929No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:32:49.351901054 CEST8.8.8.8192.168.2.70x2e28No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:07.710572958 CEST8.8.8.8192.168.2.70xd36No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:12.966074944 CEST8.8.8.8192.168.2.70x308eNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:18.380691051 CEST8.8.8.8192.168.2.70x6a52No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:37.386540890 CEST8.8.8.8192.168.2.70x8b83No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:42.590915918 CEST8.8.8.8192.168.2.70xb5edNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                                Jun 10, 2021 15:33:47.793531895 CEST8.8.8.8192.168.2.70x4f3fNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)

                                                                                Code Manipulations

                                                                                Statistics

                                                                                Behavior

                                                                                Click to jump to process

                                                                                System Behavior

                                                                                General

                                                                                Start time:15:31:16
                                                                                Start date:10/06/2021
                                                                                Path:C:\Users\user\Desktop\dYy3yfSkwY.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\Desktop\dYy3yfSkwY.exe'
                                                                                Imagebase:0x400000
                                                                                File size:682684 bytes
                                                                                MD5 hash:3DEB8B7E51C21CBA0C2C723C5AF953DD
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.254544184.0000000002180000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                Reputation:low

                                                                                General

                                                                                Start time:15:31:22
                                                                                Start date:10/06/2021
                                                                                Path:C:\Users\user\Desktop\dYy3yfSkwY.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\Desktop\dYy3yfSkwY.exe'
                                                                                Imagebase:0x400000
                                                                                File size:682684 bytes
                                                                                MD5 hash:3DEB8B7E51C21CBA0C2C723C5AF953DD
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000003.00000001.251399209.0000000000414000.00000040.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                Reputation:low

                                                                                General

                                                                                Start time:15:31:35
                                                                                Start date:10/06/2021
                                                                                Path:C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe'
                                                                                Imagebase:0x400000
                                                                                File size:682684 bytes
                                                                                MD5 hash:3DEB8B7E51C21CBA0C2C723C5AF953DD
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.308184070.0000000009810000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                Antivirus matches:
                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                • Detection: 35%, ReversingLabs
                                                                                Reputation:low

                                                                                General

                                                                                Start time:15:31:42
                                                                                Start date:10/06/2021
                                                                                Path:C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe'
                                                                                Imagebase:0x400000
                                                                                File size:682684 bytes
                                                                                MD5 hash:3DEB8B7E51C21CBA0C2C723C5AF953DD
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.317958007.0000000000400000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.319773965.000000000396D000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.319549745.00000000028EE000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.320311850.0000000004B02000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000001.299993586.0000000000414000.00000040.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.320200858.0000000004A70000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.320124108.00000000049E7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.319677498.00000000038E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                Reputation:low

                                                                                General

                                                                                Start time:15:31:43
                                                                                Start date:10/06/2021
                                                                                Path:C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\monsuyajo\opjlpsercy.exe'
                                                                                Imagebase:0x400000
                                                                                File size:682684 bytes
                                                                                MD5 hash:3DEB8B7E51C21CBA0C2C723C5AF953DD
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low

                                                                                Disassembly

                                                                                Code Analysis

                                                                                Reset < >