Loading ...

Play interactive tourEdit tour

Windows Analysis Report BXym2eR0YTBKKsB.exe

Overview

General Information

Sample Name:BXym2eR0YTBKKsB.exe
Analysis ID:527362
MD5:c57dd0f3a3495b72307cd6bbe8ed0654
SHA1:792488219eb873bd7517d7b31622f3a6d6071aa9
SHA256:debeb2b87fcaf1274ea62f5ed9f7b47f8128662b7b766729c5b3aa5b3a5ab7f5
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Connects to many ports of the same IP (likely port scanning)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • BXym2eR0YTBKKsB.exe (PID: 6240 cmdline: "C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe" MD5: C57DD0F3A3495B72307CD6BBE8ED0654)
    • schtasks.exe (PID: 1312 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • BXym2eR0YTBKKsB.exe (PID: 7036 cmdline: {path} MD5: C57DD0F3A3495B72307CD6BBE8ED0654)
      • schtasks.exe (PID: 3180 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp4F8A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 7112 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp57C8.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 7088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • BXym2eR0YTBKKsB.exe (PID: 7080 cmdline: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe 0 MD5: C57DD0F3A3495B72307CD6BBE8ED0654)
    • schtasks.exe (PID: 2132 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmp11CD.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5388 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: C57DD0F3A3495B72307CD6BBE8ED0654)
  • dhcpmon.exe (PID: 5680 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: C57DD0F3A3495B72307CD6BBE8ED0654)
    • dw20.exe (PID: 7124 cmdline: dw20.exe -x -s 1116 MD5: 8D10DA8A3E11747E51F23C882C22BBC3)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x8a7d:$a: NanoCore
    • 0x8ad6:$a: NanoCore
    • 0x8b13:$a: NanoCore
    • 0x8b8c:$a: NanoCore
    • 0xe121:$a: NanoCore
    • 0xe16b:$a: NanoCore
    • 0xe355:$a: NanoCore
    • 0x21c74:$a: NanoCore
    • 0x21c89:$a: NanoCore
    • 0x21cbe:$a: NanoCore
    • 0x3ac13:$a: NanoCore
    • 0x3ac28:$a: NanoCore
    • 0x3ac5d:$a: NanoCore
    • 0x8adf:$b: ClientPlugin
    • 0x8b1c:$b: ClientPlugin
    • 0x941a:$b: ClientPlugin
    • 0x9427:$b: ClientPlugin
    • 0xdeba:$b: ClientPlugin
    • 0xe12a:$b: ClientPlugin
    • 0xe174:$b: ClientPlugin
    • 0x21a30:$b: ClientPlugin
    0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x112c7d:$x1: NanoCore.ClientPluginHost
    • 0x14729d:$x1: NanoCore.ClientPluginHost
    • 0x112cba:$x2: IClientNetworkHost
    • 0x1472da:$x2: IClientNetworkHost
    • 0x1167ed:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x14ae0d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x1129e5:$a: NanoCore
      • 0x1129f5:$a: NanoCore
      • 0x112c29:$a: NanoCore
      • 0x112c3d:$a: NanoCore
      • 0x112c7d:$a: NanoCore
      • 0x147005:$a: NanoCore
      • 0x147015:$a: NanoCore
      • 0x147249:$a: NanoCore
      • 0x14725d:$a: NanoCore
      • 0x14729d:$a: NanoCore
      • 0x112a44:$b: ClientPlugin
      • 0x112c46:$b: ClientPlugin
      • 0x112c86:$b: ClientPlugin
      • 0x147064:$b: ClientPlugin
      • 0x147266:$b: ClientPlugin
      • 0x1472a6:$b: ClientPlugin
      • 0x112b6b:$c: ProjectData
      • 0x14718b:$c: ProjectData
      • 0x1de261:$c: ProjectData
      • 0x113572:$d: DESCrypto
      • 0x147b92:$d: DESCrypto
      Click to see the 59 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      7.2.BXym2eR0YTBKKsB.exe.5a60000.8.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1646:$x1: NanoCore.ClientPluginHost
      7.2.BXym2eR0YTBKKsB.exe.5a60000.8.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x1646:$x2: NanoCore.ClientPluginHost
      • 0x1724:$s4: PipeCreated
      • 0x1660:$s5: IClientLoggingHost
      16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x4083:$x1: NanoCore.ClientPluginHost
      16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x4083:$x2: NanoCore.ClientPluginHost
      • 0x4161:$s4: PipeCreated
      • 0x409d:$s5: IClientLoggingHost
      16.2.BXym2eR0YTBKKsB.exe.2c189d8.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1646:$x1: NanoCore.ClientPluginHost
      Click to see the 120 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe, ProcessId: 7036, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe, ProcessId: 7036, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      System Summary:

      barindex
      Sigma detected: Suspicius Add Task From User AppData TempShow sources
      Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe" , ParentImage: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe, ParentProcessId: 6240, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp, ProcessId: 1312

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe, ProcessId: 7036, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe, ProcessId: 7036, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: BXym2eR0YTBKKsB.exeReversingLabs: Detection: 34%
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 33%
      Source: C:\Users\user\AppData\Roaming\fuZNBNvJ.exeReversingLabs: Detection: 33%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f93adb.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c43adb.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb4629.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3d40f90.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3cbcd80.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.380426142.0000000002BF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 6240, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7036, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7080, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 2548, type: MEMORYSTR
      Machine Learning detection for sampleShow sources
      Source: BXym2eR0YTBKKsB.exeJoe Sandbox ML: detected
      Machine Learning detection for dropped fileShow sources
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\fuZNBNvJ.exeJoe Sandbox ML: detected
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.unpackAvira: Label: TR/NanoCore.fadte
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: BXym2eR0YTBKKsB.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: BXym2eR0YTBKKsB.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: oC:\Windows\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.375210362.000000000808A000.00000004.00000010.sdmp
      Source: Binary string: oC:\Windows\70YQ7i.pdb source: dhcpmon.exe, 00000011.00000002.382832984.0000000000AF6000.00000004.00000001.sdmp
      Source: Binary string: indows\70YQ7i.pdbpdbQ7i.pdb source: BXym2eR0YTBKKsB.exe, 00000007.00000002.561126579.0000000002A65000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\assembly\GA.pdbL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.d source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.375210362.000000000808A000.00000004.00000010.sdmp
      Source: Binary string: C:\Windows\70YQ7i.pdbM source: BXym2eR0YTBKKsB.exe, 00000007.00000002.561126579.0000000002A65000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.pdb3 source: BXym2eR0YTBKKsB.exe, 0000000C.00000003.361069331.0000000000864000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\symbols\dll\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\System.Runtime.Remoting.pdb/ source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: symbols\dll\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.375210362.000000000808A000.00000004.00000010.sdmp
      Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: BXym2eR0YTBKKsB.exe, 00000007.00000002.561126579.0000000002A65000.00000004.00000040.sdmp
      Source: Binary string: System.Runtime.Remoting.pdb0| source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\dll\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Program Files (x86).pdb Mo source: dhcpmon.exe, 00000011.00000002.382832984.0000000000AF6000.00000004.00000001.sdmp
      Source: Binary string: |indows\System.Runtime.Remoting.pdbpdbing.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\DsQzKpHbyJ\src\obj\Debug\70YQ7i.pdb source: BXym2eR0YTBKKsB.exe
      Source: Binary string: C:\Users\user\Desktop\70YQ7i.pdb source: BXym2eR0YTBKKsB.exe, 00000007.00000002.561126579.0000000002A65000.00000004.00000040.sdmp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 4x nop then mov esp, ebp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h

      Networking:

      barindex
      Connects to many ports of the same IP (likely port scanning)Show sources
      Source: global trafficTCP traffic: 185.19.85.175 ports 0,1,2,4,5,50421
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: strongodss.ddns.net
      Source: global trafficTCP traffic: 192.168.2.3:49757 -> 185.19.85.175:50421
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.292778613.0000000004FFE000.00000004.00000001.sdmpString found in binary or memory: http://en.w
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: dhcpmon.exe, 0000000D.00000002.350299522.0000000002EB1000.00000004.00000001.sdmp, dhcpmon.exe, 00000011.00000002.383675889.0000000002D51000.00000004.00000001.sdmpString found in binary or memory: http://foo.com/fooT
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294903729.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTCv
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comX
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comal
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294903729.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comma
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294766690.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-u
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294722528.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comtud
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comwdth
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.299149163.0000000005025000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.299875193.0000000005025000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.297094725.0000000004FFC000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.296967294.0000000005025000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.298841449.0000000004FFC000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlo
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.298841449.0000000004FFC000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlx;
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.298652223.0000000004FFC000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.298054853.0000000004FFC000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.297595628.0000000005025000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.297044338.0000000005025000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersF
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.297490343.0000000005025000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersP
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.307030251.0000000005025000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers_AN
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.299983843.0000000005025000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersb
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.298997567.0000000005025000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersuA8
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334390362.0000000004FF0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com=
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334390362.0000000004FF0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334390362.0000000004FF0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdiaa
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.292737397.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comicv
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294447268.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.301892695.0000000004FFC000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.301892695.0000000004FFC000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/B
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.301892695.0000000004FFC000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.302210154.0000000005036000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmL
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.293641623.0000000005000000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.krN.TTF
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.293641623.0000000005000000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.krn
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.293641623.0000000005000000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.293641623.0000000005000000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr=
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000003.294663755.0000000004FF3000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.H
      Source: BXym2eR0YTBKKsB.exeString found in binary or memory: https://forums.rpgmakerweb.com/index.php?threads/retro.135715
      Source: BXym2eR0YTBKKsB.exeString found in binary or memory: https://ocram-codes.net
      Source: unknownDNS traffic detected: queries for: strongodss.ddns.net
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0238337E WSARecv,
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f93adb.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c43adb.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb4629.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3d40f90.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3cbcd80.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.380426142.0000000002BF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 6240, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7036, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7080, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 2548, type: MEMORYSTR

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 7.2.BXym2eR0YTBKKsB.exe.5a60000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.BXym2eR0YTBKKsB.exe.2c189d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.BXym2eR0YTBKKsB.exe.2f5169c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f93adb.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f93adb.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.BXym2eR0YTBKKsB.exe.2f56518.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.BXym2eR0YTBKKsB.exe.2f5169c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.BXym2eR0YTBKKsB.exe.5910000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c43adb.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c43adb.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 16.2.BXym2eR0YTBKKsB.exe.2c1394c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.2.BXym2eR0YTBKKsB.exe.2c1394c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.BXym2eR0YTBKKsB.exe.3d40f90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.BXym2eR0YTBKKsB.exe.3d40f90.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.BXym2eR0YTBKKsB.exe.3cbcd80.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.BXym2eR0YTBKKsB.exe.3cbcd80.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.562929378.0000000005910000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000010.00000002.380426142.0000000002BF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.563029808.0000000005A60000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 6240, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 6240, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7036, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7036, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7080, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7080, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 2548, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 2548, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      .NET source code contains very large stringsShow sources
      Source: BXym2eR0YTBKKsB.exe, frmMain.csLong String: Length: 22528
      Source: fuZNBNvJ.exe.0.dr, frmMain.csLong String: Length: 22528
      Source: 0.0.BXym2eR0YTBKKsB.exe.430000.0.unpack, frmMain.csLong String: Length: 22528
      Source: 0.2.BXym2eR0YTBKKsB.exe.430000.0.unpack, frmMain.csLong String: Length: 22528
      Source: dhcpmon.exe.7.dr, frmMain.csLong String: Length: 22528
      Source: 7.2.BXym2eR0YTBKKsB.exe.890000.1.unpack, frmMain.csLong String: Length: 22528
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.1.unpack, frmMain.csLong String: Length: 22528
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.3.unpack, frmMain.csLong String: Length: 22528
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.5.unpack, frmMain.csLong String: Length: 22528
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.9.unpack, frmMain.csLong String: Length: 22528
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.2.unpack, frmMain.csLong String: Length: 22528
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.11.unpack, frmMain.csLong String: Length: 22528
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.0.unpack, frmMain.csLong String: Length: 22528
      Source: BXym2eR0YTBKKsB.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 7.2.BXym2eR0YTBKKsB.exe.5a60000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.5a60000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.2.BXym2eR0YTBKKsB.exe.2c189d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.BXym2eR0YTBKKsB.exe.2c189d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.BXym2eR0YTBKKsB.exe.2f5169c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.2f5169c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f93adb.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f93adb.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f93adb.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.BXym2eR0YTBKKsB.exe.2f56518.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.2f56518.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.BXym2eR0YTBKKsB.exe.2f5169c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.2f5169c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.BXym2eR0YTBKKsB.exe.5910000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.5910000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c43adb.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c43adb.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c43adb.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 16.2.BXym2eR0YTBKKsB.exe.2c1394c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.BXym2eR0YTBKKsB.exe.2c1394c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.2.BXym2eR0YTBKKsB.exe.2c1394c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.BXym2eR0YTBKKsB.exe.2c1394c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.BXym2eR0YTBKKsB.exe.5bb4629.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.BXym2eR0YTBKKsB.exe.3d40f90.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.BXym2eR0YTBKKsB.exe.3d40f90.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.BXym2eR0YTBKKsB.exe.3cbcd80.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.BXym2eR0YTBKKsB.exe.3cbcd80.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.562929378.0000000005910000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.562929378.0000000005910000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000010.00000002.380426142.0000000002BF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.563029808.0000000005A60000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.563029808.0000000005A60000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 6240, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 6240, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7036, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7036, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7080, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7080, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 2548, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 2548, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1116
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F2A18
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F2C98
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F1790
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F4050
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F0670
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F0070
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F006B
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F0661
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F2A09
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F0822
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F06FD
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F2C88
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F177F
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F2710
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F1F20
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_025F0190
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026A8228
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026A78F0
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026A6620
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026A8218
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026A6610
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AAA10
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AAF48
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AB348
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AEF48
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AF758
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AAF38
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AB338
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AFB98
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026A78E0
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026ABCFF
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AB172
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AAD48
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026A7D28
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AAD3A
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026AB180
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026ABD98
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_004362C5
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02997ABE
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02ACB638
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02AC2FA8
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02AC23A0
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02AC3850
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02AC8D68
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02AC9968
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02AC9A2F
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02AC306F
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_008962C5
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_02358228
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_023553B8
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_023578F0
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_023544C8
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_02356620
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_02356610
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235AA10
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_02358218
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235AF38
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235B338
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235EF19
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235F758
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235EF48
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235B348
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235AF48
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235F748
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235FB98
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235FB88
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235F4B0
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235BCFF
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_023578E0
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_02357D28
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235B178
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235E944
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235AD40
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235AD48
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235BD98
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235E986
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235B180
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04712C18
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04711710
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04712998
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04710070
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04710670
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04710661
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04710822
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04710007
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04712C09
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_047106FD
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04712690
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04711E9F
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04712680
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04711700
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04710190
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_04712989
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_007B62C5
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 16_2_005A3CC3
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 16_2_04DF2FA8
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 16_2_04DF23A0
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 16_2_04DF306F
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 16_2_005A62C5
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_006F62C5
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_051D1C66 NtQuerySystemInformation,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_051D1C2B NtQuerySystemInformation,
      Source: BXym2eR0YTBKKsB.exeBinary or memory string: OriginalFilename vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.326499808.0000000000432000.00000002.00020000.sdmpBinary or memory string: OriginalFilename70YQ7i.exe: vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.335988932.0000000007F90000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.332243481.0000000002BAF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exeBinary or memory string: OriginalFilename vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.559129449.0000000000892000.00000002.00020000.sdmpBinary or memory string: OriginalFilename70YQ7i.exe: vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exeBinary or memory string: OriginalFilename vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.361616670.0000000000012000.00000002.00020000.sdmpBinary or memory string: OriginalFilename70YQ7i.exe: vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363495214.0000000002701000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362622770.00000000007EA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exeBinary or memory string: OriginalFilename vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000010.00000000.357370542.00000000005A2000.00000002.00020000.sdmpBinary or memory string: OriginalFilename70YQ7i.exe: vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exe, 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs BXym2eR0YTBKKsB.exe
      Source: BXym2eR0YTBKKsB.exeBinary or memory string: OriginalFilename70YQ7i.exe: vs BXym2eR0YTBKKsB.exe
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: security.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: security.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: security.dll
      Source: BXym2eR0YTBKKsB.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: fuZNBNvJ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: dhcpmon.exe.7.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: BXym2eR0YTBKKsB.exeReversingLabs: Detection: 34%
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile read: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeJump to behavior
      Source: BXym2eR0YTBKKsB.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe "C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe"
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe {path}
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp4F8A.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp57C8.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe 0
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmp11CD.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe {path}
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1116
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe {path}
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp4F8A.tmp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp57C8.tmp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmp11CD.tmp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe {path}
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1116
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_051D1A26 AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_051D19EF AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile created: C:\Users\user\AppData\Roaming\fuZNBNvJ.exeJump to behavior
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD2C1.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@22/14@9/2
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6420:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7088:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2148:120:WilError_01
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ce7fbdd9-3c95-435d-8876-f66955192db5}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5052:120:WilError_01
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: BXym2eR0YTBKKsB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: BXym2eR0YTBKKsB.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: BXym2eR0YTBKKsB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: oC:\Windows\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.375210362.000000000808A000.00000004.00000010.sdmp
      Source: Binary string: oC:\Windows\70YQ7i.pdb source: dhcpmon.exe, 00000011.00000002.382832984.0000000000AF6000.00000004.00000001.sdmp
      Source: Binary string: indows\70YQ7i.pdbpdbQ7i.pdb source: BXym2eR0YTBKKsB.exe, 00000007.00000002.561126579.0000000002A65000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\assembly\GA.pdbL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.d source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.375210362.000000000808A000.00000004.00000010.sdmp
      Source: Binary string: C:\Windows\70YQ7i.pdbM source: BXym2eR0YTBKKsB.exe, 00000007.00000002.561126579.0000000002A65000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.pdb3 source: BXym2eR0YTBKKsB.exe, 0000000C.00000003.361069331.0000000000864000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\assembly\GAC_MSIL\System.Runtime.Remoting\2.0.0.0__b77a5c561934e089\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\symbols\dll\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\System.Runtime.Remoting.pdb/ source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: symbols\dll\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.375210362.000000000808A000.00000004.00000010.sdmp
      Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: BXym2eR0YTBKKsB.exe, 00000007.00000002.561126579.0000000002A65000.00000004.00000040.sdmp
      Source: Binary string: System.Runtime.Remoting.pdb0| source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\dll\System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: System.Runtime.Remoting.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Program Files (x86).pdb Mo source: dhcpmon.exe, 00000011.00000002.382832984.0000000000AF6000.00000004.00000001.sdmp
      Source: Binary string: |indows\System.Runtime.Remoting.pdbpdbing.pdb source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362545112.00000000007C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\DsQzKpHbyJ\src\obj\Debug\70YQ7i.pdb source: BXym2eR0YTBKKsB.exe
      Source: Binary string: C:\Users\user\Desktop\70YQ7i.pdb source: BXym2eR0YTBKKsB.exe, 00000007.00000002.561126579.0000000002A65000.00000004.00000040.sdmp

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: BXym2eR0YTBKKsB.exe, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: fuZNBNvJ.exe.0.dr, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 0.0.BXym2eR0YTBKKsB.exe.430000.0.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 0.2.BXym2eR0YTBKKsB.exe.430000.0.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: dhcpmon.exe.7.dr, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 7.2.BXym2eR0YTBKKsB.exe.890000.1.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.1.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.3.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.5.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.9.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.2.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.11.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.890000.0.unpack, frmMain.cs.Net Code: Q_I3 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_0043B273 push ss; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_0043B921 push ss; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_026A4E60 push ebx; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_004362C5 push es; retn 0000h
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_0089B921 push ss; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_0089B273 push ss; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02982DD9 push edi; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02982851 push edi; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02982D48 push ecx; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02982DCD push edi; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02982FB8 push eax; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_029828BD push edi; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_029827B4 push eax; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02982869 push edi; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02982D6D push eax; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02982D60 push ecx; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_029974B8 push ebp; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_029974AC push ecx; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02999DEC pushfd ; retf
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02999D70 push eax; retf
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_02999D74 pushad ; retf
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_008962C5 push es; retn 0000h
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0001B921 push ss; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0001B273 push ss; ret
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235E2CC push ecx; retf
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_0235E06C pushfd ; iretd
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_007BB273 push ss; ret
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_007BB921 push ss; ret
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_00FE2FF4 push ecx; ret
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_00FE2935 push edi; ret
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_00FE2FE8 push ecx; ret
      Source: BXym2eR0YTBKKsB.exeStatic PE information: 0xA23402CC [Sun Mar 26 17:33:00 2056 UTC]
      Source: initial sampleStatic PE information: section name: .text entropy: 7.6984087559
      Source: initial sampleStatic PE information: section name: .text entropy: 7.6984087559
      Source: initial sampleStatic PE information: section name: .text entropy: 7.6984087559
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile created: C:\Users\user\AppData\Roaming\fuZNBNvJ.exeJump to dropped file
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeFile opened: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM3Show sources
      Source: Yara matchFile source: 00000000.00000002.332243481.0000000002BAF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 6240, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7080, type: MEMORYSTR
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.332243481.0000000002BAF000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.332243481.0000000002BAF000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 6904Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 6996Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 4844Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 4844Thread sleep count: 127 > 30
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 4844Thread sleep count: 202 > 30
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 5096Thread sleep count: 200 > 30
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 2824Thread sleep time: -460000s >= -30000s
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 5108Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 5372Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5104Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4348Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe TID: 4780Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6092Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeWindow / User API: foregroundWindowGot 786
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_051D174E GetSystemInfo,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: VMWARE
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362622770.00000000007EA000.00000004.00000020.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.363562772.000000000274F000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.362622770.00000000007EA000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess token adjusted: Debug
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess queried: DebugPort
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeMemory written: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeMemory written: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe {path}
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp4F8A.tmp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp57C8.tmp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmp11CD.tmp
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeProcess created: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe {path}
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1116
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.561860166.00000000031B9000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.560701392.0000000001570000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.560701392.0000000001570000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.560701392.0000000001570000.00000002.00020000.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f93adb.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c43adb.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb4629.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3d40f90.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3cbcd80.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.380426142.0000000002BF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 6240, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7036, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7080, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 2548, type: MEMORYSTR

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: BXym2eR0YTBKKsB.exe, 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: BXym2eR0YTBKKsB.exe, 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
      Source: BXym2eR0YTBKKsB.exe, 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: BXym2eR0YTBKKsB.exe, 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: BXym2eR0YTBKKsB.exe, 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: BXym2eR0YTBKKsB.exe, 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f8ec9e.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f93adb.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c43adb.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c3ec9e.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.2.BXym2eR0YTBKKsB.exe.3c49511.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.3f99511.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.BXym2eR0YTBKKsB.exe.5bb4629.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 12.2.BXym2eR0YTBKKsB.exe.3803af0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3d40f90.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3cbcd80.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.BXym2eR0YTBKKsB.exe.3c63af0.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.380426142.0000000002BF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 6240, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7036, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 7080, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: BXym2eR0YTBKKsB.exe PID: 2548, type: MEMORYSTR
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_04CC0A8E listen,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_04CC0E9E bind,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_04CC0A50 listen,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 0_2_04CC0E6B bind,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_051D2F3E bind,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 7_2_051D2F0E bind,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_02380E9E bind,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_02380A8E listen,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_02380E6B bind,
      Source: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exeCode function: 12_2_02380A50 listen,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05410FC6 bind,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05410A8E listen,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05410A50 CreateMutexW,listen,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_05410F93 bind,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_05370A8E listen,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_05370FC6 bind,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_05370F93 bind,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 17_2_05370A50 listen,

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobScheduled Task/Job1Access Token Manipulation1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery13Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Process Injection112Obfuscated Files or Information3Security Account ManagerSecurity Software Discovery211SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Scheduled Task/Job1Software Packing13NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptTimestomp1LSA SecretsVirtualization/Sandbox Evasion31SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol11Jamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading2DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion31Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Access Token Manipulation1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Process Injection112Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronHidden Files and Directories1Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 527362 Sample: BXym2eR0YTBKKsB.exe Startdate: 23/11/2021 Architecture: WINDOWS Score: 100 60 Malicious sample detected (through community Yara rule) 2->60 62 Multi AV Scanner detection for dropped file 2->62 64 Multi AV Scanner detection for submitted file 2->64 66 12 other signatures 2->66 8 BXym2eR0YTBKKsB.exe 8 2->8         started        12 BXym2eR0YTBKKsB.exe 6 2->12         started        14 dhcpmon.exe 5 2->14         started        17 dhcpmon.exe 2->17         started        process3 dnsIp4 50 C:\Users\user\AppData\Roaming\fuZNBNvJ.exe, PE32 8->50 dropped 52 C:\Users\user\AppData\Local\...\tmpD2C1.tmp, XML 8->52 dropped 54 C:\Users\user\...\BXym2eR0YTBKKsB.exe.log, ASCII 8->54 dropped 70 Uses schtasks.exe or at.exe to add and modify task schedules 8->70 72 Injects a PE file into a foreign processes 8->72 19 BXym2eR0YTBKKsB.exe 1 14 8->19         started        24 schtasks.exe 1 8->24         started        26 schtasks.exe 1 12->26         started        28 BXym2eR0YTBKKsB.exe 2 12->28         started        58 127.0.0.1 unknown unknown 14->58 30 dw20.exe 17->30         started        file5 signatures6 process7 dnsIp8 56 strongodss.ddns.net 185.19.85.175, 49757, 49762, 49765 DATAWIRE-ASCH Switzerland 19->56 44 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->44 dropped 46 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 19->46 dropped 48 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->48 dropped 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->68 32 schtasks.exe 1 19->32         started        34 schtasks.exe 1 19->34         started        36 conhost.exe 24->36         started        38 conhost.exe 26->38         started        file9 signatures10 process11 process12 40 conhost.exe 32->40         started        42 conhost.exe 34->42         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      BXym2eR0YTBKKsB.exe34%ReversingLabsWin32.Backdoor.Bladabhindi
      BXym2eR0YTBKKsB.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\fuZNBNvJ.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe33%ReversingLabsWin32.Backdoor.Bladabhindi
      C:\Users\user\AppData\Roaming\fuZNBNvJ.exe33%ReversingLabsWin32.Backdoor.Bladabhindi

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      16.0.BXym2eR0YTBKKsB.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.0.BXym2eR0YTBKKsB.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      16.0.BXym2eR0YTBKKsB.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      16.2.BXym2eR0YTBKKsB.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.0.BXym2eR0YTBKKsB.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      16.0.BXym2eR0YTBKKsB.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      16.0.BXym2eR0YTBKKsB.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.2.BXym2eR0YTBKKsB.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.0.BXym2eR0YTBKKsB.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.2.BXym2eR0YTBKKsB.exe.5bb0000.9.unpack100%AviraTR/NanoCore.fadteDownload File
      7.0.BXym2eR0YTBKKsB.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      7.0.BXym2eR0YTBKKsB.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      16.0.BXym2eR0YTBKKsB.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://www.carterandcone.comn-u0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://foo.com/fooT0%Avira URL Cloudsafe
      http://www.fonts.comicv0%Avira URL Cloudsafe
      http://www.carterandcone.comal0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.carterandcone.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.carterandcone.comma0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htmL0%Avira URL Cloudsafe
      http://www.goodfont.co.krn0%Avira URL Cloudsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.fontbureau.com=0%Avira URL Cloudsafe
      http://www.sandoll.co.kr=0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.carterandcone.comTC0%URL Reputationsafe
      http://www.carterandcone.comX0%URL Reputationsafe
      http://www.carterandcone.comtud0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/B0%Avira URL Cloudsafe
      http://www.fontbureau.coma0%URL Reputationsafe
      http://en.w0%URL Reputationsafe
      http://www.zhongyicts.com.cno.H0%Avira URL Cloudsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.fontbureau.comdiaa0%Avira URL Cloudsafe
      http://www.carterandcone.comTCv0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      https://ocram-codes.net0%Avira URL Cloudsafe
      http://www.carterandcone.comwdth0%URL Reputationsafe
      http://www.goodfont.co.krN.TTF0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      strongodss.ddns.net
      185.19.85.175
      truefalse
        high

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designers_ANBXym2eR0YTBKKsB.exe, 00000000.00000003.307030251.0000000005025000.00000004.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designersuA8BXym2eR0YTBKKsB.exe, 00000000.00000003.298997567.0000000005025000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designersGBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designersFBXym2eR0YTBKKsB.exe, 00000000.00000003.297044338.0000000005025000.00000004.00000001.sdmpfalse
                high
                http://www.carterandcone.comn-uBXym2eR0YTBKKsB.exe, 00000000.00000003.294766690.0000000004FF3000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/?BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://foo.com/fooTdhcpmon.exe, 0000000D.00000002.350299522.0000000002EB1000.00000004.00000001.sdmp, dhcpmon.exe, 00000011.00000002.383675889.0000000002D51000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designers?BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                    high
                    http://www.fonts.comicvBXym2eR0YTBKKsB.exe, 00000000.00000003.292737397.000000000500B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.comalBXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.tiro.comBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.299149163.0000000005025000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.299875193.0000000005025000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comBXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersPBXym2eR0YTBKKsB.exe, 00000000.00000003.297490343.0000000005025000.00000004.00000001.sdmpfalse
                        high
                        http://www.sajatypeworks.comBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTheBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmBXym2eR0YTBKKsB.exe, 00000000.00000003.301892695.0000000004FFC000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.commaBXym2eR0YTBKKsB.exe, 00000000.00000003.294903729.0000000004FF3000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designersbBXym2eR0YTBKKsB.exe, 00000000.00000003.299983843.0000000005025000.00000004.00000001.sdmpfalse
                          high
                          http://www.galapagosdesign.com/DPleaseBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmLBXym2eR0YTBKKsB.exe, 00000000.00000003.302210154.0000000005036000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fonts.comBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                            high
                            http://www.goodfont.co.krnBXym2eR0YTBKKsB.exe, 00000000.00000003.293641623.0000000005000000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sandoll.co.krBXym2eR0YTBKKsB.exe, 00000000.00000003.293641623.0000000005000000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleaseBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cnBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.comBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com=BXym2eR0YTBKKsB.exe, 00000000.00000002.334390362.0000000004FF0000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.sandoll.co.kr=BXym2eR0YTBKKsB.exe, 00000000.00000003.293641623.0000000005000000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.apache.org/licenses/LICENSE-2.0BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                                high
                                http://www.galapagosdesign.com/BXym2eR0YTBKKsB.exe, 00000000.00000003.301892695.0000000004FFC000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmloBXym2eR0YTBKKsB.exe, 00000000.00000003.298841449.0000000004FFC000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.carterandcone.comTCBXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comXBXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://forums.rpgmakerweb.com/index.php?threads/retro.135715BXym2eR0YTBKKsB.exefalse
                                    high
                                    http://www.carterandcone.comtudBXym2eR0YTBKKsB.exe, 00000000.00000003.294722528.0000000004FF3000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.galapagosdesign.com/BBXym2eR0YTBKKsB.exe, 00000000.00000003.301892695.0000000004FFC000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comaBXym2eR0YTBKKsB.exe, 00000000.00000002.334390362.0000000004FF0000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://en.wBXym2eR0YTBKKsB.exe, 00000000.00000003.292778613.0000000004FFE000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cno.HBXym2eR0YTBKKsB.exe, 00000000.00000003.294663755.0000000004FF3000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.carterandcone.comlBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cn/BXym2eR0YTBKKsB.exe, 00000000.00000003.294447268.0000000004FF3000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnBXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlBXym2eR0YTBKKsB.exe, 00000000.00000003.298652223.0000000004FFC000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.298054853.0000000004FFC000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.fontbureau.comdiaaBXym2eR0YTBKKsB.exe, 00000000.00000002.334390362.0000000004FF0000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.comTCvBXym2eR0YTBKKsB.exe, 00000000.00000003.294903729.0000000004FF3000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8BXym2eR0YTBKKsB.exe, 00000000.00000002.334730924.00000000062A2000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.297595628.0000000005025000.00000004.00000001.sdmpfalse
                                          high
                                          https://ocram-codes.netBXym2eR0YTBKKsB.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designers/BXym2eR0YTBKKsB.exe, 00000000.00000003.297094725.0000000004FFC000.00000004.00000001.sdmp, BXym2eR0YTBKKsB.exe, 00000000.00000003.296967294.0000000005025000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.carterandcone.comwdthBXym2eR0YTBKKsB.exe, 00000000.00000003.294854451.0000000004FF3000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.goodfont.co.krN.TTFBXym2eR0YTBKKsB.exe, 00000000.00000003.293641623.0000000005000000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers/cabarga.htmlx;BXym2eR0YTBKKsB.exe, 00000000.00000003.298841449.0000000004FFC000.00000004.00000001.sdmpfalse
                                              high

                                              Contacted IPs

                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs

                                              Public

                                              IPDomainCountryFlagASNASN NameMalicious
                                              185.19.85.175
                                              strongodss.ddns.netSwitzerland
                                              48971DATAWIRE-ASCHfalse

                                              Private

                                              IP
                                              127.0.0.1

                                              General Information

                                              Joe Sandbox Version:34.0.0 Boulder Opal
                                              Analysis ID:527362
                                              Start date:23.11.2021
                                              Start time:17:12:15
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 13m 32s
                                              Hypervisor based Inspection enabled:false
                                              Report type:light
                                              Sample file name:BXym2eR0YTBKKsB.exe
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:24
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@22/14@9/2
                                              EGA Information:Failed
                                              HDC Information:Failed
                                              HCA Information:
                                              • Successful, ratio: 98%
                                              • Number of executed functions: 0
                                              • Number of non-executed functions: 0
                                              Cookbook Comments:
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Found application associated with file extension: .exe
                                              Warnings:
                                              Show All
                                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                              • TCP Packets have been reduced to 100
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 92.122.145.220, 20.189.173.22
                                              • Excluded domains from analysis (whitelisted): e12564.dspb.akamaiedge.net, client.wns.windows.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, watson.telemetry.microsoft.com, arc.msn.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.

                                              Simulations

                                              Behavior and APIs

                                              TimeTypeDescription
                                              17:13:22API Interceptor772x Sleep call for process: BXym2eR0YTBKKsB.exe modified
                                              17:13:36Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe" s>$(Arg0)
                                              17:13:36AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              17:13:39Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                              17:13:55API Interceptor1x Sleep call for process: dw20.exe modified

                                              Joe Sandbox View / Context

                                              IPs

                                              No context

                                              Domains

                                              No context

                                              ASN

                                              No context

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):501760
                                              Entropy (8bit):7.685148876221274
                                              Encrypted:false
                                              SSDEEP:12288:X9s+Jfby068DIb2mTFKOcZSZ7CAz83NHMwYXUEY:FVZ68MqK8OH+AzxXUEY
                                              MD5:C57DD0F3A3495B72307CD6BBE8ED0654
                                              SHA1:792488219EB873BD7517D7B31622F3A6D6071AA9
                                              SHA-256:DEBEB2B87FCAF1274EA62F5ED9F7B47F8128662B7B766729C5B3AA5B3A5AB7F5
                                              SHA-512:48865A5C1F1FFB61D688673C7C6CB852CA9009A6B041C6F167E1B28860587FE04C3086A598D4C6E30C66E6652D1EC12F600ACCE0F72BAA92932F1A3EABE05C37
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 33%
                                              Reputation:unknown
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....4...............P.................. ........@.. ....................................@.....................................O.......................................8............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H............$..............x............................................0............(....(..........(.....o ....*.....................(!......("......(#......($......(%....*N..(....o....(&....*&..('....*.s(........s)........s*........s+........s,........*....0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....+..*.0......
                                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Reputation:unknown
                                              Preview: [ZoneTransfer]....ZoneId=0
                                              C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_dhcpmon.exe_661e7bcc3050bf83705c423cabd5fc11697a8ea_00000000_1bb3625e\Report.wer
                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                              File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.0502358180111422
                                              Encrypted:false
                                              SSDEEP:192:nurIi6/242vaPLk9Mg5N3gFm1pzvnukEt/u7sCS274It:urs/2payRv1E/u7sCX4It
                                              MD5:4AEE1A7C26B81BD18CD9BA28668AAA8B
                                              SHA1:24257313379E34EB106E0C61A335D86AB16A90F0
                                              SHA-256:2FE51014FAC6CD063D6890D23A0F50A908B83BDB0BC027DACE4CEF9421182384
                                              SHA-512:828FD0A89286E6EACF260F78CB12C679A3A89AC022B159C46F5CC333556E2B7AFF00C221DBB1C9DD71BF80B0553AF4410FC100E6097C1F8A39A0EE17989E9B91
                                              Malicious:false
                                              Reputation:unknown
                                              Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.2.1.9.0.0.3.0.0.4.7.6.8.0.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.2.1.9.0.0.3.4.5.0.0.7.7.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.8.7.b.d.e.b.1.-.9.2.5.c.-.4.1.a.c.-.9.6.c.b.-.c.b.c.b.7.c.c.b.0.4.2.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.7.0.Y.Q.7.i...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.3.0.-.0.0.0.1.-.0.0.1.c.-.4.0.7.9.-.a.6.8.6.d.0.e.0.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.d.4.4.d.4.1.d.b.2.d.6.4.a.a.7.0.f.4.e.9.8.1.8.4.a.7.c.3.0.1.3.0.0.0.0.0.0.0.0.!.0.0.0.0.7.9.2.4.8.8.2.1.9.e.b.8.7.3.b.d.7.5.1.7.d.7.b.3.1.6.2.2.f.3.a.6.d.6.0.7.1.a.a.9.!.d.h.c.p.m.o.n...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.5.6././.0.3././.2.6.:.1.7.:.3.3.:.0.0.!.0.!.d.h.c.p.m.o.n...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.a.r.g.e.t.
                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WERD6C8.tmp.WERInternalMetadata.xml
                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                              File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):7696
                                              Entropy (8bit):3.7077009746108853
                                              Encrypted:false
                                              SSDEEP:192:Rrl7r3GLNiR06Uw6YF/SUeW5gmfZaASxCp1bU1fcpm:RrlsNii6Uw6Y9SUx5gmfUAS4b+fP
                                              MD5:42D3391E81EA085101F7D15ECE8C51C2
                                              SHA1:AB6BF4C3FC01AA10C7763BFF9A9DAED2F0A2C0F3
                                              SHA-256:E041DE9B21DDE637F89B4C3332D19B95384D102C119F724A4694135F46F8CDB6
                                              SHA-512:2039701709F8CB989B4BD22B79E12540195539AB167D21C54070E9F5A30C4C5AAB6C8F149C435EBF4F2F5AC38FC754E089FD4CF4DD5178FBEA60A33F6FB999BD
                                              Malicious:false
                                              Reputation:unknown
                                              Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.8.0.<./.P.i.d.>.......
                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC37.tmp.xml
                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4709
                                              Entropy (8bit):4.499144448482539
                                              Encrypted:false
                                              SSDEEP:48:cvIwSD8zsoJgtWI9FZWSC8Bq8fm8M4JFKFy9VGFc2d2+q8vgy9V3mUAfj+2z22nk:uITfueoSNhJFK8V4YKfV3/2z22nOd
                                              MD5:95C3DBAFECE7EADFCD00BC95A77BDE22
                                              SHA1:E921403B71E23102FD0DAB90FB300402014BD23F
                                              SHA-256:5A725E4A01BB876F4932B53E764256899267F1AEAE5BB5BED4EF976FA8D348C5
                                              SHA-512:928E0F73E2C308DFB52EF93F8B9D4269C65084E1DCB181B42AB3F0264829AE4064B1A71C04C3A4900AF404CE831158D44B656C16A84D7E1EA4AC744C0248E74B
                                              Malicious:false
                                              Reputation:unknown
                                              Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1267824" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\BXym2eR0YTBKKsB.exe.log
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):916
                                              Entropy (8bit):5.282390836641403
                                              Encrypted:false
                                              SSDEEP:24:MLF20NaL3z2p29hJ5g522rW2xAi3AP26K95rKoO2+g2+:MwLLD2Y9h3go2rxxAcAO6ox+g2+
                                              MD5:5AD8E7ABEADADAC4CE06FF693476581A
                                              SHA1:81E42A97BBE3D7DE8B1E8B54C2B03C48594D761E
                                              SHA-256:BAA1A28262BA27D51C3A1FA7FB0811AD1128297ABB2EDCCC785DC52667D2A6FD
                                              SHA-512:7793E78E84AD36CE65B5B1C015364E340FB9110FAF199BC0234108CE9BCB1AEDACBD25C6A012AC99740E08BEA5E5C373A88E553E47016304D8AE6AEEAB58EBFF
                                              Malicious:true
                                              Reputation:unknown
                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\de460308a9099237864d2ec2328fc958\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..
                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):916
                                              Entropy (8bit):5.282390836641403
                                              Encrypted:false
                                              SSDEEP:24:MLF20NaL3z2p29hJ5g522rW2xAi3AP26K95rKoO2+g2+:MwLLD2Y9h3go2rxxAcAO6ox+g2+
                                              MD5:5AD8E7ABEADADAC4CE06FF693476581A
                                              SHA1:81E42A97BBE3D7DE8B1E8B54C2B03C48594D761E
                                              SHA-256:BAA1A28262BA27D51C3A1FA7FB0811AD1128297ABB2EDCCC785DC52667D2A6FD
                                              SHA-512:7793E78E84AD36CE65B5B1C015364E340FB9110FAF199BC0234108CE9BCB1AEDACBD25C6A012AC99740E08BEA5E5C373A88E553E47016304D8AE6AEEAB58EBFF
                                              Malicious:false
                                              Reputation:unknown
                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\de460308a9099237864d2ec2328fc958\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..
                                              C:\Users\user\AppData\Local\Temp\tmp11CD.tmp
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1641
                                              Entropy (8bit):5.196052386509268
                                              Encrypted:false
                                              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBf8tn:cbh47TlNQ//rydbz9I3YODOLNdq3Vq
                                              MD5:F5DD85C4FF7AECA31B0CDEAB30917212
                                              SHA1:056E907E5279177F77A88F08087A6ED97599DDE8
                                              SHA-256:5ADAAECDDB29DA667D0A128759AAFE67EA6517DD2B3409920BCA4C908AB66EB6
                                              SHA-512:12A758B6394642B6F0AC1131A123E8C619C79680CF83AC28696C99E982FF78C0E32F178B1CB56033F08C0FD2EC185F5B78B539DB9D7C0BE7179AC583D5939CE9
                                              Malicious:false
                                              Reputation:unknown
                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                              C:\Users\user\AppData\Local\Temp\tmp4F8A.tmp
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1305
                                              Entropy (8bit):5.127978950756048
                                              Encrypted:false
                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK08Wxtn:cbk4oL600QydbQxIYODOLedq3Mj
                                              MD5:DC26512706055480F418942E571351C3
                                              SHA1:B38BBF1660E9D4546CF573D8EFEE34E8C9F689E3
                                              SHA-256:78708CA8FC9200AF41EC6BBC539631A6B4A1F0DF5933C38BFA8D0559003FCED2
                                              SHA-512:9D74194206EF8F13C0702D6DA23060DD736371C2F9425BE5824A8894877BC8BCD985444ADCBE8FAC8AE74C8A8D0E9756AF075EA85A3EA4BBC68F41F53B65FC3F
                                              Malicious:false
                                              Reputation:unknown
                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                              C:\Users\user\AppData\Local\Temp\tmp57C8.tmp
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):1310
                                              Entropy (8bit):5.109425792877704
                                              Encrypted:false
                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                              Malicious:false
                                              Reputation:unknown
                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                              C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1641
                                              Entropy (8bit):5.196052386509268
                                              Encrypted:false
                                              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBf8tn:cbh47TlNQ//rydbz9I3YODOLNdq3Vq
                                              MD5:F5DD85C4FF7AECA31B0CDEAB30917212
                                              SHA1:056E907E5279177F77A88F08087A6ED97599DDE8
                                              SHA-256:5ADAAECDDB29DA667D0A128759AAFE67EA6517DD2B3409920BCA4C908AB66EB6
                                              SHA-512:12A758B6394642B6F0AC1131A123E8C619C79680CF83AC28696C99E982FF78C0E32F178B1CB56033F08C0FD2EC185F5B78B539DB9D7C0BE7179AC583D5939CE9
                                              Malicious:true
                                              Reputation:unknown
                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:ISO-8859 text, with no line terminators
                                              Category:dropped
                                              Size (bytes):8
                                              Entropy (8bit):3.0
                                              Encrypted:false
                                              SSDEEP:3:x9CL8t:XCL8t
                                              MD5:19C8C23AD156817C4D42277037E3B0B2
                                              SHA1:A06899E3E8785A240ECB4E545A0702C3797A2AD4
                                              SHA-256:82F4D1079537CE6261899C6C4EB6660CF28DF155B3A7BA504D446BA264A38355
                                              SHA-512:970C8E198389371A8D3D8E6EA5CDCF3537784B2C4A9AD1536A13F82A5DFCBFBEC2867F53D0528AC1D8A41334C22807A1D856601739058A0210C4A4F1926CE3A7
                                              Malicious:true
                                              Reputation:unknown
                                              Preview: Q....H
                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):42
                                              Entropy (8bit):4.526495328097802
                                              Encrypted:false
                                              SSDEEP:3:oNWXp5vnm8xhvdAn:oNWXpFm8x9C
                                              MD5:E689E1B3DB86627026BA2DECEE634709
                                              SHA1:132DEAE275EE23914B431FD232CB13C29394946D
                                              SHA-256:88B4CDBF7ECAA33C2212DCECB3FC39C592AD98EC34D70DECAA45293ECF2D11F2
                                              SHA-512:9523FC9E2704E6C0E91211C9749403C936D2C9D6B4596E201E4D979367028EC5D6E779063B3D265D60744CB5463F90ECB961C1B0D9D0F2A6EE9970809D2EFC32
                                              Malicious:false
                                              Reputation:unknown
                                              Preview: C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              C:\Users\user\AppData\Roaming\fuZNBNvJ.exe
                                              Process:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):501760
                                              Entropy (8bit):7.685148876221274
                                              Encrypted:false
                                              SSDEEP:12288:X9s+Jfby068DIb2mTFKOcZSZ7CAz83NHMwYXUEY:FVZ68MqK8OH+AzxXUEY
                                              MD5:C57DD0F3A3495B72307CD6BBE8ED0654
                                              SHA1:792488219EB873BD7517D7B31622F3A6D6071AA9
                                              SHA-256:DEBEB2B87FCAF1274EA62F5ED9F7B47F8128662B7B766729C5B3AA5B3A5AB7F5
                                              SHA-512:48865A5C1F1FFB61D688673C7C6CB852CA9009A6B041C6F167E1B28860587FE04C3086A598D4C6E30C66E6652D1EC12F600ACCE0F72BAA92932F1A3EABE05C37
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 33%
                                              Reputation:unknown
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....4...............P.................. ........@.. ....................................@.....................................O.......................................8............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H............$..............x............................................0............(....(..........(.....o ....*.....................(!......("......(#......($......(%....*N..(....o....(&....*&..('....*.s(........s)........s*........s+........s,........*....0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....+..*.0......

                                              Static File Info

                                              General

                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.685148876221274
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:BXym2eR0YTBKKsB.exe
                                              File size:501760
                                              MD5:c57dd0f3a3495b72307cd6bbe8ed0654
                                              SHA1:792488219eb873bd7517d7b31622f3a6d6071aa9
                                              SHA256:debeb2b87fcaf1274ea62f5ed9f7b47f8128662b7b766729c5b3aa5b3a5ab7f5
                                              SHA512:48865a5c1f1ffb61d688673c7c6cb852ca9009a6b041c6f167e1b28860587fe04c3086a598d4c6e30c66e6652d1ec12f600acce0f72baa92932f1a3eabe05c37
                                              SSDEEP:12288:X9s+Jfby068DIb2mTFKOcZSZ7CAz83NHMwYXUEY:FVZ68MqK8OH+AzxXUEY
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....4...............P.................. ........@.. ....................................@................................

                                              File Icon

                                              Icon Hash:00828e8e8686b000

                                              Static PE Info

                                              General

                                              Entrypoint:0x47b0fa
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                              Time Stamp:0xA23402CC [Sun Mar 26 17:33:00 2056 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:v2.0.50727
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                              Entrypoint Preview

                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al

                                              Data Directories

                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x7b0a70x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x1114.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x7b0080x38.text
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                              Sections

                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x791000x79200False0.864385803664data7.6984087559IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                              .rsrc0x7c0000x11140x1200False0.380859375data4.92849031699IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x7e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                              Resources

                                              NameRVASizeTypeLanguageCountry
                                              RT_VERSION0x7c0900x348data
                                              RT_MANIFEST0x7c3e80xd25XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators

                                              Imports

                                              DLLImport
                                              mscoree.dll_CorExeMain

                                              Version Infos

                                              DescriptionData
                                              Translation0x0000 0x04b0
                                              LegalCopyrightCopyright 2021 Marko Paakkunainen
                                              Assembly Version1.0.0.0
                                              InternalName70YQ7i.exe
                                              FileVersion1.0.0.0
                                              CompanyName
                                              LegalTrademarks
                                              Comments
                                              ProductNameRETRO Plugin
                                              ProductVersion1.0.0.0
                                              FileDescriptionRETRO Plugin
                                              OriginalFilename70YQ7i.exe

                                              Network Behavior

                                              Snort IDS Alerts

                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              11/23/21-17:13:39.930659UDP254DNS SPOOF query response with TTL of 1 min. and no authority53511438.8.8.8192.168.2.3
                                              11/23/21-17:13:46.239022UDP254DNS SPOOF query response with TTL of 1 min. and no authority53590268.8.8.8192.168.2.3
                                              11/23/21-17:14:17.941137UDP254DNS SPOOF query response with TTL of 1 min. and no authority53632978.8.8.8192.168.2.3
                                              11/23/21-17:14:23.952299UDP254DNS SPOOF query response with TTL of 1 min. and no authority53583618.8.8.8192.168.2.3
                                              11/23/21-17:14:57.409214UDP254DNS SPOOF query response with TTL of 1 min. and no authority53571068.8.8.8192.168.2.3
                                              11/23/21-17:15:03.062834UDP254DNS SPOOF query response with TTL of 1 min. and no authority53603528.8.8.8192.168.2.3

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 23, 2021 17:13:39.946347952 CET4975750421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:13:40.033814907 CET5042149757185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:13:40.551065922 CET4975750421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:13:40.623951912 CET5042149757185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:13:41.129201889 CET4975750421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:13:41.175926924 CET5042149757185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:13:46.385481119 CET4976250421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:13:46.480521917 CET5042149762185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:13:46.989108086 CET4976250421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:13:47.066956043 CET5042149762185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:13:47.567245007 CET4976250421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:13:47.649230957 CET5042149762185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:13:53.127007008 CET4976550421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:13:53.199117899 CET5042149765185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:13:53.770910025 CET4976550421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:13:53.822808981 CET5042149765185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:13:54.474122047 CET4976550421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:13:54.554847002 CET5042149765185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:13:58.569924116 CET4976850421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:01.584135056 CET4976850421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:01.676426888 CET5042149768185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:02.193562984 CET4976850421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:02.268496990 CET5042149768185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:06.274276018 CET4977550421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:06.367846012 CET5042149775185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:06.881823063 CET4977550421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:06.937020063 CET5042149775185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:07.443942070 CET4977550421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:07.490078926 CET5042149775185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:12.061728001 CET4977750421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:12.132500887 CET5042149777185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:12.698340893 CET4977750421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:12.738363981 CET5042149777185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:13.381948948 CET4977750421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:13.495657921 CET5042149777185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:18.081024885 CET4977950421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:18.163407087 CET5042149779185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:18.679335117 CET4977950421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:18.770356894 CET5042149779185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:19.273133993 CET4977950421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:19.367068052 CET5042149779185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:23.954174995 CET4978050421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:24.025171995 CET5042149780185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:24.539103031 CET4978050421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:24.665930033 CET5042149780185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:25.179842949 CET4978050421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:25.232410908 CET5042149780185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:30.444375992 CET4978150421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:30.559323072 CET5042149781185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:31.070939064 CET4978150421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:37.071445942 CET4978150421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:37.153211117 CET5042149781185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:41.168652058 CET4978350421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:41.246203899 CET5042149783185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:41.759305954 CET4978350421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:41.817395926 CET5042149783185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:42.321929932 CET4978350421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:42.385373116 CET5042149783185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:46.481107950 CET4978450421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:46.577289104 CET5042149784185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:47.087866068 CET4978450421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:47.130193949 CET5042149784185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:47.635025024 CET4978450421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:47.712153912 CET5042149784185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:51.714514971 CET4978550421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:51.767728090 CET5042149785185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:52.385277987 CET4978550421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:52.488468885 CET5042149785185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:53.088628054 CET4978550421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:53.121145964 CET5042149785185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:57.410650015 CET4978750421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:57.484891891 CET5042149787185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:57.995069027 CET4978750421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:58.057787895 CET5042149787185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:14:58.573299885 CET4978750421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:14:58.641149998 CET5042149787185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:03.111506939 CET4978850421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:03.186813116 CET5042149788185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:03.698846102 CET4978850421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:03.746866941 CET5042149788185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:04.261219978 CET4978850421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:04.302076101 CET5042149788185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:09.503402948 CET4978950421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:09.650389910 CET5042149789185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:10.152565956 CET4978950421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:10.246737003 CET5042149789185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:10.777412891 CET4978950421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:10.851716042 CET5042149789185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:15.346342087 CET4979050421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:15.423413992 CET5042149790185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:15.943418026 CET4979050421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:16.033960104 CET5042149790185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:16.543438911 CET4979050421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:16.695462942 CET5042149790185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:20.701530933 CET4979250421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:20.761300087 CET5042149792185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:21.273858070 CET4979250421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:21.362302065 CET5042149792185.19.85.175192.168.2.3
                                              Nov 23, 2021 17:15:21.867666960 CET4979250421192.168.2.3185.19.85.175
                                              Nov 23, 2021 17:15:21.967412949 CET5042149792185.19.85.175192.168.2.3

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 23, 2021 17:13:39.903204918 CET5114353192.168.2.38.8.8.8
                                              Nov 23, 2021 17:13:39.930659056 CET53511438.8.8.8192.168.2.3
                                              Nov 23, 2021 17:13:46.217525005 CET5902653192.168.2.38.8.8.8
                                              Nov 23, 2021 17:13:46.239022017 CET53590268.8.8.8192.168.2.3
                                              Nov 23, 2021 17:13:53.105035067 CET4957253192.168.2.38.8.8.8
                                              Nov 23, 2021 17:13:53.124823093 CET53495728.8.8.8192.168.2.3
                                              Nov 23, 2021 17:14:17.920016050 CET6329753192.168.2.38.8.8.8
                                              Nov 23, 2021 17:14:17.941137075 CET53632978.8.8.8192.168.2.3
                                              Nov 23, 2021 17:14:23.930802107 CET5836153192.168.2.38.8.8.8
                                              Nov 23, 2021 17:14:23.952299118 CET53583618.8.8.8192.168.2.3
                                              Nov 23, 2021 17:14:30.317308903 CET5361553192.168.2.38.8.8.8
                                              Nov 23, 2021 17:14:30.337045908 CET53536158.8.8.8192.168.2.3
                                              Nov 23, 2021 17:14:57.387691021 CET5710653192.168.2.38.8.8.8
                                              Nov 23, 2021 17:14:57.409214020 CET53571068.8.8.8192.168.2.3
                                              Nov 23, 2021 17:15:03.040230036 CET6035253192.168.2.38.8.8.8
                                              Nov 23, 2021 17:15:03.062834024 CET53603528.8.8.8192.168.2.3
                                              Nov 23, 2021 17:15:09.481403112 CET5677353192.168.2.38.8.8.8
                                              Nov 23, 2021 17:15:09.501406908 CET53567738.8.8.8192.168.2.3

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Nov 23, 2021 17:13:39.903204918 CET192.168.2.38.8.8.80xf30eStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                              Nov 23, 2021 17:13:46.217525005 CET192.168.2.38.8.8.80x7e6Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                              Nov 23, 2021 17:13:53.105035067 CET192.168.2.38.8.8.80x3cStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                              Nov 23, 2021 17:14:17.920016050 CET192.168.2.38.8.8.80xdc2fStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                              Nov 23, 2021 17:14:23.930802107 CET192.168.2.38.8.8.80x95bcStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                              Nov 23, 2021 17:14:30.317308903 CET192.168.2.38.8.8.80xc495Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                              Nov 23, 2021 17:14:57.387691021 CET192.168.2.38.8.8.80xe722Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                              Nov 23, 2021 17:15:03.040230036 CET192.168.2.38.8.8.80xadeeStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                              Nov 23, 2021 17:15:09.481403112 CET192.168.2.38.8.8.80x3113Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Nov 23, 2021 17:13:39.930659056 CET8.8.8.8192.168.2.30xf30eNo error (0)strongodss.ddns.net185.19.85.175A (IP address)IN (0x0001)
                                              Nov 23, 2021 17:13:46.239022017 CET8.8.8.8192.168.2.30x7e6No error (0)strongodss.ddns.net185.19.85.175A (IP address)IN (0x0001)
                                              Nov 23, 2021 17:13:53.124823093 CET8.8.8.8192.168.2.30x3cNo error (0)strongodss.ddns.net185.19.85.175A (IP address)IN (0x0001)
                                              Nov 23, 2021 17:14:17.941137075 CET8.8.8.8192.168.2.30xdc2fNo error (0)strongodss.ddns.net185.19.85.175A (IP address)IN (0x0001)
                                              Nov 23, 2021 17:14:23.952299118 CET8.8.8.8192.168.2.30x95bcNo error (0)strongodss.ddns.net185.19.85.175A (IP address)IN (0x0001)
                                              Nov 23, 2021 17:14:30.337045908 CET8.8.8.8192.168.2.30xc495No error (0)strongodss.ddns.net185.19.85.175A (IP address)IN (0x0001)
                                              Nov 23, 2021 17:14:57.409214020 CET8.8.8.8192.168.2.30xe722No error (0)strongodss.ddns.net185.19.85.175A (IP address)IN (0x0001)
                                              Nov 23, 2021 17:15:03.062834024 CET8.8.8.8192.168.2.30xadeeNo error (0)strongodss.ddns.net185.19.85.175A (IP address)IN (0x0001)
                                              Nov 23, 2021 17:15:09.501406908 CET8.8.8.8192.168.2.30x3113No error (0)strongodss.ddns.net185.19.85.175A (IP address)IN (0x0001)

                                              Code Manipulations

                                              Statistics

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:17:13:13
                                              Start date:23/11/2021
                                              Path:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe"
                                              Imagebase:0x430000
                                              File size:501760 bytes
                                              MD5 hash:C57DD0F3A3495B72307CD6BBE8ED0654
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.332243481.0000000002BAF000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.333259047.0000000003B61000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              Reputation:low

                                              General

                                              Start time:17:13:24
                                              Start date:23/11/2021
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2C1.tmp
                                              Imagebase:0x1010000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:17:13:25
                                              Start date:23/11/2021
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7f20f0000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:17:13:26
                                              Start date:23/11/2021
                                              Path:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              Wow64 process (32bit):true
                                              Commandline:{path}
                                              Imagebase:0x890000
                                              File size:501760 bytes
                                              MD5 hash:C57DD0F3A3495B72307CD6BBE8ED0654
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.562022450.0000000003F87000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.562929378.0000000005910000.00000004.00020000.sdmp, Author: Florian Roth
                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.562929378.0000000005910000.00000004.00020000.sdmp, Author: Florian Roth
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.322917905.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, Author: Florian Roth
                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.563149725.0000000005BB0000.00000004.00020000.sdmp, Author: Joe Security
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.320292572.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.320728680.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.321906752.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.558866137.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.563029808.0000000005A60000.00000004.00020000.sdmp, Author: Florian Roth
                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.563029808.0000000005A60000.00000004.00020000.sdmp, Author: Florian Roth
                                              Reputation:low

                                              General

                                              Start time:17:13:33
                                              Start date:23/11/2021
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp4F8A.tmp
                                              Imagebase:0x1010000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:17:13:34
                                              Start date:23/11/2021
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7f20f0000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:17:13:35
                                              Start date:23/11/2021
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp57C8.tmp
                                              Imagebase:0x1010000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:17:13:36
                                              Start date:23/11/2021
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7f20f0000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:17:13:36
                                              Start date:23/11/2021
                                              Path:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe 0
                                              Imagebase:0x10000
                                              File size:501760 bytes
                                              MD5 hash:C57DD0F3A3495B72307CD6BBE8ED0654
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.364841713.0000000003701000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              Reputation:low

                                              General

                                              Start time:17:13:39
                                              Start date:23/11/2021
                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                              Imagebase:0x7b0000
                                              File size:501760 bytes
                                              MD5 hash:C57DD0F3A3495B72307CD6BBE8ED0654
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 33%, ReversingLabs
                                              Reputation:low

                                              General

                                              Start time:17:13:41
                                              Start date:23/11/2021
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fuZNBNvJ" /XML "C:\Users\user\AppData\Local\Temp\tmp11CD.tmp
                                              Imagebase:0x1010000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:17:13:42
                                              Start date:23/11/2021
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7f20f0000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:17:13:43
                                              Start date:23/11/2021
                                              Path:C:\Users\user\Desktop\BXym2eR0YTBKKsB.exe
                                              Wow64 process (32bit):true
                                              Commandline:{path}
                                              Imagebase:0x5a0000
                                              File size:501760 bytes
                                              MD5 hash:C57DD0F3A3495B72307CD6BBE8ED0654
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000010.00000000.357309570.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.380470660.0000000003BF1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000010.00000000.357817060.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000010.00000000.359789773.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.379808216.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000010.00000000.358481197.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.380426142.0000000002BF1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.380426142.0000000002BF1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              Reputation:low

                                              General

                                              Start time:17:13:44
                                              Start date:23/11/2021
                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                              Imagebase:0x6f0000
                                              File size:501760 bytes
                                              MD5 hash:C57DD0F3A3495B72307CD6BBE8ED0654
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:.Net C# or VB.NET
                                              Reputation:low

                                              General

                                              Start time:17:13:49
                                              Start date:23/11/2021
                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                              Wow64 process (32bit):true
                                              Commandline:dw20.exe -x -s 1116
                                              Imagebase:0x10000000
                                              File size:33936 bytes
                                              MD5 hash:8D10DA8A3E11747E51F23C882C22BBC3
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Disassembly

                                              Code Analysis

                                              Reset < >